This report discusses the possible threats and risks to confidential data in the database of HR in Charity, and the risks that are vulnerable to the organization after proper SaaS migration. It also covers the security and privacy of employee data, digital identities issues, provider solutions issues, and data sensitivity.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CLOUD PRIVACY AND SECURITY Cloud Privacy and Security Name of the Student Name of the University Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 CLOUD PRIVACY AND SECURITY Table of Contents Introduction................................................................................................................................2 Discussion..................................................................................................................................3 Case Study..............................................................................................................................3 1. Security of Employee Data................................................................................................4 1.1 Existing Threats or Risks for the Data Security in HR Database................................4 1.2 Additional Threats and Risks after Migration to SaaS.................................................5 1.3 Severity of Threats and Risks in the Employee Data...................................................6 2. Privacy of Employee Data.................................................................................................8 2.1 Existing Threats or Risks for the Data Privacy within Database of HR......................8 2.2 Additional Risks and Threats after Migration to SaaS.................................................9 2.3 Severity of Threats and Risks in the Employee Data.................................................10 3. Digital Identities Issues....................................................................................................11 4. Provider Solutions Issues.................................................................................................12 5. Data Sensitivity................................................................................................................13 Conclusion................................................................................................................................13 References................................................................................................................................16
2 CLOUD PRIVACY AND SECURITY Introduction The technology of cloud computing is defined as the most significant paradigm of IT or information technology that allows the major access to all kinds of sharing pools of several configurable system resources and even the higher level services (Dinh et al., 2013). All of the services thus can be quickly and easily provisioned with the lowest effort of management with proper Internet connection. This cloud computing significantly depends on several kinds of resource sharing to achieve the coherences and economies of scale, which is completely same as the public utilities. The third party cloud is responsible for enabling the companies to focus on the main businesses and not on expending resources over the maintenance or infrastructure of computer systems (Fernando, Loke & Rahayu, 2013). The main advantage of cloud computing is that this helps in allowing its clients to minimize or avoid the cost of IT infrastructures. Therefore, cloud computing i-s extremely cost effective and could be utilized by all types of organizations. Furthermore, cloud computing even utilizes the SOA or service oriented architectures, utility computing and hardware virtualization. The main features of the cloud computing includes improving the organizational agility, independency of locations as wellasdevices,betterperformance,increasedproductivity,costeffectiveness,higher reliability and scalability, application maintenance, data privacy and security, business continuity planning, disaster recovery, elasticity, resource pooling and many more (Arora, Parashar & Transforming, 2013). The main cloud service models are IaaS or infrastructure as a service, PaaS or platform as a service and SaaS or software as a service. This report will be explaining a detailed and proper discussion about the Charity case study. A small data centre is present with Windows Servers 2008 R2 and any other web service. This charity will be joining a specific community cloud, which is eventually providedbythevendorofpubliccloudtoprovidethevariousapplicationstotheir
3 CLOUD PRIVACY AND SECURITY administrative users and about 500 staff members. The sensitive information is needed to be kept safe with the technology of cloud computing. The report outlines the few possible threats and risks to those confidential data in the database of HR. Moreover, there are certain risks that are vulnerable to the organization after proper SaaS migration and the security or privacy of information is observed with the risks. These several risks to digital identities of the employees of the charity for migrating to SaaS or the ethical and data sensitivity issues will be provided in the report. Discussion Case Study The Charity is the community, which is being involved to locate as well as provide training services and support services, mental health services and accommodation services. These types of services are provided to all types of disadvantaged persons within that community (Hashem et al., 2015). The charity majorly runs a smaller data centre that is consisting of some of the 50 x 64 bit server running. All of these servers are file services, WindowsServers2008R2andthedatabasesforservicesofdesktop.Theproper confidentiality and integrity of PII data of this charity is being maintained perfectly and this datum includes fewer digital identities for all disadvantaged customers. The Board of Charity gets concerned about the privacy and security of the confidential and sensitive data; this would prevent the data breaching in that community. A decision has been taken by them to purchase an application of personnel management and human resources from the US based company that can provide SaaS solutions (Li et al., 2013). Furthermore, they have even decided to move their payroll system to the application of COTS or Commercial Off The Shelf for the purpose of managing within public cloud and also moving their intranet services
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 CLOUD PRIVACY AND SECURITY to the Microsoft SharePoint PaaS to provide the intranet services in every agency within the WofG. 1. Security of Employee Data 1.1 Existing Threats or Risks for the Data Security in HR Database The employees’ data in the Charity eventually faces the several kinds of issues that are related to security. These data are stored within the database of human resources and hence the sensitive information or data is under stake (Rittinghouse & Ransome, 2016). For the main cause of this kind of vulnerability, the proper recognition of all the existing risks or threats is compulsory within the HR database. The most significant risks or threats to the employees’ data security within this database of HR are as follows: i)Database Injection Attacks: The most popular and dangerous types of threats, which are specifically existing within the database of human resource in charity are known as the database injection attacks. The database injection attack is the significant technique of the code injection, which is used to attack the applications that are driven by data (Garg, Versteeg & Buyya, 2013). With the help of this attack, the dangerous statements of SQL could be eventually inserted in the entry fields for the perfect executions. ii)Denial of Service Attack: The denial of service or DoS attack is considered as one of the most dangerous and nefarious attacks that could cause major destructions within the HR database of the charity. It is a type of cyber attack, where the perpetrator is seeking to make the network resources or machines unavailable for the authenticated users (Xiao, Song & Chen, 2013). This is done by disrupting the services of the host temporarily that is solely connected to the Internet connection. The distributed denial of service can be defined as the incoming traffic eventually floods the victim after originating from several sources.
5 CLOUD PRIVACY AND SECURITY iii)Malware: The third important and popular risk to the data security within the HR database of charity is the malware. This malware is defined as a type of malicious software that is subsequently designed to cause the various damages to computer networks, servers and computers (Hashizume et al., 2013). The major damage to the database is done with the help of this malicious software and it is found in a form of executable codes, executable scripts and active content. The most popular examples of the malware mainly include ransom ware, Trojan horses, adware, computer virus and various others. The HR database of charity could be promptly hacked or attacked by this malware and hence the sensitive data can be stolen. iv)Legitimate Privilege Abuse: The next significant threat or risk to the HR database of charity is the legitimate privilege abuse (Jain & Paul, 2013). Each and every user, who has the right to utilize the employees’ data, can quickly exploit the privileges and thus can utilize those data from incorrect or illegal deeds. The legitimate privilege abuse is extremely dangerous for all the databases and thus the HR database of charity is not free from the abuses. 1.2 Additional Threats and Risks after Migration to SaaS This charity has decided for moving their services and workloads to the cloud to bring more profit and success in their business. Software as a service or SaaS can be defined as the significant software licensing and delivery model, in which this software is solely licensed based on the subscriptions (Krishna, 2013). The cloud service models are accessed by all the users by a specific thin client via web browser. The software of CAD and Microsoft office, the system for payroll processing and virtualization are the most important applications of SaaS. Hence, when the workloads are getting migrated to the cloud service models, these services could be vulnerable to several threats or risks. These risks are as follows:
6 CLOUD PRIVACY AND SECURITY i)Data Deletion: The first threatthat can often occur when the SaaS migration is completed is the data deletion. All the risks, which are connected to this deletion of data subsequently, exist as the client has minimized the control or visibility, in which this data is stored in the cloud and a reduced capability to properly verifying data security (Botta et al., 2016). The process of data deletion is easier and hence SaaS migration occurs properly. ii)Negotiation for the Internet Access Managing of API: The second important threat after the migration of SaaS within charity is the negotiation in the management of internet accessible application programming interface or API. These APIs that are used by the clients to manage or interact with services of clouds are significantly exposed to public and hence are extremely dangerous (Herbst, Kounev & Reussner, 2013). Several types of risks are present in the API and hence the risks can be turned to various attacks. iii)Reducing Visibility and Control: Another important and significant threat after migrating to SaaS is reducing the control and visibility of the private data. When assets and operations are being transitioned to cloud, these companies significantly lose most of the control or visibility of data (Wei et al., 2014). The specific shift in the cloud service model specifically direct to shifting of paradigm for the purpose of monitoring security. iv)Self Services Inducing the Unauthorized Users: The several on demanding self services are responsible for inducing the unauthorized or unauthenticated uses and hence allowing the employees of the company to provision additional services. The simple SaaS implementation and low costs are responsible for the unauthorized uses. 1.3 Severity of Threats and Risks in the Employee Data The severity of the threats and risks for the employees’ data in Charity is clearly observed according to the severity of these risks (Rong, Nguyen & Jaatun, 2013). All of these threats can be divided to 4 distinct categories. These are given below:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 CLOUD PRIVACY AND SECURITY i)Maximum: The first and most dangerous category of risk for measuring severity is the maximum category. The overall vulnerability of this particular risk is very high in respect to other risks and the lost data cannot be easily recovered and thus the organization faces major issues (Gao et al., 2013). This particular risk category is required to be ceased on time for the purpose of stopping any type of vulnerabilities. From all the identified threats or risks for the security of employee data in the charity, the most dangerous attacks are the database injection attacks. ii)Significant: The second risk category after maximum within the plan of risk assessment is the category of significant. The significant risk category helps to provide severe destruction in the database and the total data confidentiality and integrity are affected (Gupta, Seetharaman & Raj, 2013). From all the identified threats or risks for the security of employee data in the charity, the significant category of risk is denial of service attack. This type of attack is extremely dangerous since the user does not have any idea about the vulnerabilities and thus iii)Limited: The next risk category after significant within the risk assessment plan is the limited category. The limited risks are as vulnerable as the rest of the risks. However, there could be serious issues to security, if proper actions are not taken in time (Almorsy, Grundy & Müller, 2016). From all the identified threats or risks for the security of employee data in the charity, the limited category of risk is the malwares. These malwares are certain executable codes that are utilized for the purpose of data hacking and thus spreading the vulnerability. iv)Negligible: The fourth and the lowest severity risk is the negligible risk. This particular risk category can be eventually kept as the negligible category and is not at all vulnerable for the companies and clients. For the significant negligibility of risks, this never
8 CLOUD PRIVACY AND SECURITY affects the sensitivity of the data within the company (Whaiduzzaman et al., 2014). From all the identified threats or risks for the security of employee data in the charity, the negligible category of risk is the legitimate privilege abuse. The overall severity is absolutely lower than the rest of the risk categories and thus mitigation techniques are not required for these issues. 2. Privacy of Employee Data 2.1 Existing Threats or Risks for the Data Privacy within Database of HR The privacy of sensitive as well as confidential data in the database of HR in Charity is not observed perfectly. For the negligence in data privacy, these companies eventually undergo the vulnerabilities that are dangerous for the companies (Avram, 2014). The several existing threats or risks for data privacy within the database of HR of this charity are as follows: i)Lack of Authentication: One of the most dangerous and significant threat to the data privacy of charity HR database is the lack of authentication. Authentication is the most important factor that helps to enable the authorized users to prevent their data from getting hacked and thus the attackers and hackers cannot recognize the proper database users. Brute force attack and social engineering attack are considered as the most popular strategies of attacks in cyber world (Oliveira, Thomas & Espadanal, 2014). The perfect implementation of passwords or two factor authentications are required for these authentication purposes. These mechanisms of authentication for the techniques of easy to use and scalability are eventually integrated with the significant infrastructure of user management or enterprise directory. ii)Database Protocol Vulnerability: The next important risk is the database protocol vulnerability. There are various vulnerabilities in database protocol that allows all types of unauthenticated data access and leads to corruption (Xiao & Xiao, 2013). These codes could be executed on the target database server and the attacks can be defeated by properly
9 CLOUD PRIVACY AND SECURITY validating the SQL communications. All of these vulnerabilities are extremely nefarious for database as they cannot be avoided at all. iii)Leaking Personal Data: Another significant threat to the data privacy is the leaking of the personal data (Sanaei et al., 2014). These data can be eventually leaked or exposed in the specific cloud and thus the confidential information significantly loses its confidentiality. This particular threat is very common for the database of the charity. iv)Exposing the Backup Data: The final dangerous threat to the data privacy in the Charity database is specifically exposing the backup data. The backups should be properly encrypted and thus few vendors provide the solution to use future DBMS or database managementsystemservices(Taoetal.,2014).Thesedonotsupportanytypeof unencrypted backup data. The integrity of data is thus lost. 2.2 Additional Risks and Threats after Migration to SaaS Since, Charity has decided to shift their services to cloud; they have chosen SaaS for this purpose. There are several additional threats or risks that are vulnerable in nature and could cause major issues in this purpose. They are as follows: i)Increasing Complexities for the Staffs: All the staffs of an organization are not equal and thus they do not have similar knowledge regarding the software as a service cloud deployment model (O’Driscoll, Daugelaite & Sleator, 2013). This in turn increases the several complexities for them and for the organization and they suffer from complexities. ii)Stolen Credentials: The confidential credentials are being stolen easily after then services are being migrated to the cloud. These stolen credentials are extremely dangerous as the confidentiality are easily hacked and could not be prevented at any costs (Sadiku, Musa,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 CLOUD PRIVACY AND SECURITY & Momoh, 2014). The attacker or the hacker could thus easily access the services of the authorized users to provide any resource. iii)Inadequate Due Diligence: The inadequate due diligence are performed after the migration of SaaS and thus moving these data to cloud. All the security measures might get affected for this and hence all types of vulnerabilities occur. iv)Insiders Attacks: The fourth type of threat that is dangerous for the data privacy of the Charity database is the insiders’ attack (Khan et al., 2013). When the SaaS migration is completed, each and every cloud vendor and organizational staffs can get the data access and hence the data could be easily exploited and these are termed as the insiders’ attacks. These are extremely common for the SaaS cloud model. 2.3 Severity of Threats and Risks in the Employee Data The severity of each and every recognized threats or risks for data privacy is complete dependent on the four categories. These risk categories are as follows: i)Maximum: The most dangerous and the nefarious risk category is the category of maximum. This category is as the most dangerous risk from every other risk categories (Alshamaila, Papagiannidis & Li, 2013). From all the identified threats or risks for the security of employee data in the charity, the maximum category of risk is the database protocol vulnerabilities. ii)Significant: The second nefarious risk category is the category of significant. If any action is not taken properly, the risk could be dangerous and extremely threatening for the company (Xia et al., 2016). From all the identified threats or risks for the security of employee data in the charity, the significant category of risk is the exposing of all the backup data. These attackers could be easily hacking the data and using them for wrong deeds.
11 CLOUD PRIVACY AND SECURITY iii)Limited: The third category of risk is the limited category. This particular category is not as vulnerable as the previous two and could be avoided if stopped on time. From all the identified threats or risks for the security of employee data in the charity, the limited category of risk is the leaking of the personal data (Lian, Yen & Wang, 2014). The personal data should not be breached at any cost and thus proper mitigation plans are required in the organizational database to maintain the data privacy. iv)Negligible: The fourth risk category is the category of negligible. These negligible risks are extremely vulnerable for the database of the Charity. The organizations can easily avoid these risks by implementing various mitigation techniques (Botta et al., 2014). From all the identified threats or risks for the security of employee data in the charity, the limited category of risk is the lack of authentication. 3. Digital Identities Issues The digital identity is defined as the entities or information, which is used by several computer systems to properly represent all the specific external agents. These few agents could either an organization, a device, an application or a person. The sensitive data is kept in the digital identity and thus the assessment and the authentication of users interact with the few business systems (Chen et al., 2016). The human operators are not involved in this process and the digital identity can allow the service access, which is provided for being automatic. This charity has taken the decision for moving all the employees’ data to SaaS application and thus digital identities are utilized. Several risks or threats are present for the digital identities of the employees of this charity and these risks are as follows: i)Poor Authentication:The first and the foremost risk to the digital identities is the poor authentication. If the digital identities are not properly authenticated, there is always a high chance that the confidentiality and integrity of the data would be lost (Suo et al., 2013).
12 CLOUD PRIVACY AND SECURITY The hackers can easily hack the data and hence the unauthorized access could be easily stopped and the charity will not be facing any more issues regarding authentication in digital identities. ii)Proper Verifications: A perfect verification is required for the digital identities of the Charity employees. This type of verification of digital identities of every individual transaction is needed (Manvi & Shyam, 2014). This threat eventually is responsible for bringing major issues of data within the charity. 4. Provider Solutions Issues The operational location and the operational solution of SaaS provider are present to manage the human resources within the Charity. These operational solutions can be defined as the kinds of business analytics, which significantly focus on improving all the existing operations. Hence, this business analytics mainly involves using numerous tools for either for data mining or for data aggregation and thus getting better information to plan the business (Carlin & Curran, 2013). These businesses can simply pursue operational analytics within various methodologies. The few software packages, which are extremely efficient as well as effective to show that the operations within the business are well executed, are checked within a given time frame. All the tools will be providing the visual models. Simultaneously, the operational locations are the specific locations, in which these operations would be undertaking the paces and would be managed significantly. The management of operations is the major area that deals with the perfect control and designing of production process. Several threats are present and are properly identified for privacy and security of the employee data in Charity (Pearson, 2013). All these risks like database injection attacks, malwares, DoS attacks, lack of authentication and authorization, leaking of
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13 CLOUD PRIVACY AND SECURITY the personal data, insiders’ attacks and various others. These risks are easily mitigated with the help of operational solutions and thus these solutions are effective for the charity. 5. Data Sensitivity Several issues related to data sensitivity, jurisdiction and ethics is present that should be used by the employees of Charity. The major ethical issues in this case are as follows: i)Humanity Ethics: The most significant issue of this factor is the humanity (Hashizume et al., 2013). As disadvantages people will be interacting in this charity, this particular factor is important. ii)Stolen Credentials: The data or the other credentials should not be stolen at any cost and thus this ethics should be maintained. The two issues of data sensitivity in this charity are as follows: i)Strict Data Access: The sensitive data must be protected and the access should not be given to everyone (Rittinghouse & Ransome, 2016). This would stop the illegal access of data to a great extent. ii)Perfect Authentication: The confidential data must be perfectly authenticated and thus the data can be protected perfectly. The two issues of jurisdiction in the charity are as follows: i)Cyber Crime: Cyber crime is considered as one of the most common jurisdiction issue in any organization. This should be stopped at every aspect. ii)Legal Issues: These issues are given the top priority and thus any type of illegal activity can lead to major destruction for the charity (Fernando, Loke & Rahayu, 2013).
14 CLOUD PRIVACY AND SECURITY Conclusion Therefore, from the above report, conclusion can be drawn that the technology of cloud computing can be defined as significant technology or tool that helps to deliver all types of hosted services over the connection of Internet. This cloud computing enables the companies to consume the several computing resources such as the applications, storages and few virtual machines. The several infrastructures of computing are well built as well as maintained in those companies. The most important advantage of the technology of cloud computing is that each and every end user can be spinning up the fewer resources of computing for all kinds of workloads as per demand. The provisioning of self services helps to eliminate the traditional requirements for administrators of information technology to manage these computing resources. Another important benefit of the cloud computing technology mainly includes the companies in scaling up various requirements of computing promptly as per the client demands. Hence, the massive investments within the local infrastructures are solely eradicated and elasticity is being maintained. This particular technology comprises of the capability to be available in terms of high capacity networks, storage devices and low cost systems. These computing resources are measured at granular levels and thus each and every user would be paying for resources and workloads, which are being utilized by them. The third important benefit of cloud computing is that those clients can quickly migrate their several workloads from or to the respective cloud and even to the various cloud platforms. For the advantage of cost effectiveness, this particular technology is used by each and every popular company throughout the world. The most significant applications, which can share their characteristics with cloud computing technology, are fog computing, client server models, cloud sandbox, utility computing and many others. The four distinct deployment models of this cloud computing majorly involve public cloud, private cloud, community cloud and hybrid cloud. This report has properly outlined the entire case
15 CLOUD PRIVACY AND SECURITY study of the charity in details. This particular charity has decided for purchasing the application of personnel management from an American organization that provides few SaaS solutions and even to move the intranet service to Microsoft SharePoint PaaS. This would be done to provide intranet services to all agencies in WofG. The various threats or risks to the database of the charity are properly described here. The ethical issues, data sensitivity issues, provider solutions and issues of digital identities are also given in the above report.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16 CLOUD PRIVACY AND SECURITY References Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Alshamaila, Y., Papagiannidis, S., & Li, F. (2013). Cloud computing adoption by SMEs in the north east of England: A multi-perspective framework.Journal of Enterprise Information Management,26(3), 250-275. Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing usingencryptionalgorithms.Internationaljournalofengineeringresearchand applications,3(4), 1922-1926. Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, 529-534. Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of cloud computing and internet of things. InFuture internet of things and cloud (FiCloud), 2014 international conference on(pp. 23-30). IEEE. Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, 684-700. Carlin, S., & Curran, K. (2013). Cloud computing security. InPervasive and Ubiquitous TechnologyInnovationsforAmbientIntelligenceEnvironments(pp.12-17).IGI Global. Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user computation offloading for mobile-edge cloud computing.IEEE/ACM Transactions on Networking, (5), 2795- 2808.
17 CLOUD PRIVACY AND SECURITY Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture,applications,andapproaches.Wirelesscommunicationsandmobile computing,13(18), 1587-1611. Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey.Future generation computer systems,29(1), 84-106. Gao, Y., Guan, H., Qi, Z., Hou, Y., & Liu, L. (2013). A multi-objective ant colony system algorithm for virtual machine placement in cloud computing.Journal of Computer and System Sciences,79(8), 1230-1242. Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), 1012-1023. Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing bysmallandmediumbusinesses.InternationalJournalofInformation Management,33(5), 861-874. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues.Information Systems,47, 98-115. Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of internet services and applications,4(1), 5. Herbst, N. R., Kounev, S., & Reussner, R. H. (2013, June). Elasticity in Cloud Computing: What It Is, and What It Is Not. InICAC(Vol. 13, pp. 23-27).
18 CLOUD PRIVACY AND SECURITY Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud computing: a survey.IEEE Communications Magazine,51(11), 24-31. Khan, A. N., Kiah, M. M., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile cloud computing: A survey.Future Generation Computer Systems,29(5), 1278-1299. Krishna, P. V. (2013). Honey bee behavior inspired load balancing of tasks in cloud computing environments.Applied Soft Computing,13(5), 2292-2303. Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), 131-143. Lian, J. W., Yen, D. C., & Wang, Y. T. (2014). An exploratory study to understand the criticalfactorsaffectingthedecisiontoadoptcloudcomputinginTaiwan hospital.International Journal of Information Management,34(1), 28-36. Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS)incloudcomputing:Asurvey.JournalofNetworkandComputer Applications,41, 424-440. O’Driscoll, A., Daugelaite, J., & Sleator, R. D. (2013). ‘Big data’, Hadoop and cloud computing in genomics.Journal of biomedical informatics,46(5), 774-781. Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud computingadoption:Ananalysisofthemanufacturingandservices sectors.Information & Management,51(5), 497-510. Pearson, S. (2013). Privacy, security and trust in cloud computing. InPrivacy and Security for Cloud Computing(pp. 3-42). Springer, London.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19 CLOUD PRIVACY AND SECURITY Rittinghouse,J.W.,&Ransome,J.F.(2016).Cloudcomputing:implementation, management, and security. CRC press. Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing.Computers & Electrical Engineering,39(1), 47-54. Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and challenges.IEEE potentials,33(1), 34-36. Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing:taxonomyandopenchallenges.IEEECommunicationsSurveys& Tutorials,16(1), 369-392. Suo, H., Liu, Z., Wan, J., & Zhou, K. (2013, July). Security and privacy in mobile cloud computing.InWirelessCommunicationsandMobileComputingConference (IWCMC), 2013 9th International(pp. 655-659). IEEE. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system.IEEE Transactions on Industrial Informatics,10(2), 1435-1442. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security andprivacyforstorageandcomputationincloudcomputing.Information Sciences,258, 371-386. Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, 325-344.
20 CLOUD PRIVACY AND SECURITY Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing.IEEE Transactions on Information Forensics and Security,11(11), 2594-2608. Xiao,Z.,&Xiao,Y.(2013).Securityandprivacyincloudcomputing.IEEE Communications Surveys & Tutorials,15(2), 843-859. Xiao, Z., Song, W., & Chen, Q. (2013). Dynamic resource allocation using virtual machines for cloud computing environment.IEEE Trans. Parallel Distrib. Syst.,24(6), 1107- 1117.