Privacy in cloud computing environments: a survey and research challenges

被引:28
作者
Ghorbel, Amal [1 ]
Ghorbel, Mahmoud [1 ]
Jmaiel, Mohamed [2 ]
机构
[1] Univ Sfax, ENIS, ReDCAD Lab, BP 1173, Sfax 3038, Tunisia
[2] Digital Res Ctr Sfax, BP 275, Sakiet Ezzit 3021, Sfax, Tunisia
关键词
Survey; Privacy; Cloud computing; Privacy issues; Data confidentiality; SECURITY ISSUES; ENFORCEMENT;
D O I
10.1007/s11227-016-1953-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Definitely, cloud computing represents a real evolution in the IT world that provides many advantages for both providers and users. This new paradigm includes several services that allow data storage and processing. However, outsourcing data to the cloud raises many issues related to privacy concerns. In fact, for some organizations and individuals, data privacy present a crucial aspect of their business. Indeed, their sensitive data (health, finance, personal information, etc.) have a very important value, and any infringement of privacy can cause great loss in terms of money and reputation. Therefore, without considering privacy issues, the adoption of cloud computing can be discarded by large spectra of users. In this paper, we provide a survey on privacy risks and challenges for public cloud computing. We present and evaluate the main existing solutions that have made great progress in this area. To better address privacy concerns, we point out considerations and guidelines while giving the remained open issues that require additional investigation efforts to fulfill preserving and enhancing privacy in public cloud.
引用
收藏
页码:2763 / 2800
页数:38
相关论文
共 77 条
[31]   Balancing privacy versus accuracy in research protocols [J].
Goroff, Daniel L. .
SCIENCE, 2015, 347 (6221) :479-480
[32]   Trust as a facilitator in cloud computing: a survey [J].
Habib, Sheikh Mahbub ;
Hauke, Sascha ;
Ries, Sebastian ;
Muhlhauser, Max .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2012, 1 (01) :1-18
[33]   Secure searches in the cloud: A survey [J].
Han, Fei ;
Qin, Jing ;
Hu, Jiankun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 :66-75
[34]  
Hassan N., 2016, INT J COMPUTER SCI I, V14, P52
[35]  
Hornung G, 2012, SCRIPTED, V25, P64
[36]   Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures [J].
Itani, Wassim ;
Kayssi, Ayman ;
Chehab, Ali .
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, :711-716
[37]  
Jansen Wayne., 2011, NIST special publication, V800, P10
[38]  
Jyothi P., 2013, International Journal of Advanced Research in Computer and Communication Engineering, V2
[39]  
Kelbert Florian, 2015, Applied Cryptography and Network Security. 13th International Conference, ACNS 2015. RevisedSelected Papers: LNCS 9092, P409, DOI 10.1007/978-3-319-28166-7_20
[40]  
Kelbert Florian., 2013, Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY '13, P71, DOI DOI 10.1145/2435349.2435358