Enhance Data Security and Privacy in Cloud

Enhance Data Security and Privacy in Cloud

Hicham Amellal, Abdelmajid Meslouhi, Abderahim El Allati, Annas El Haddadi
Copyright: © 2020 |Pages: 16
DOI: 10.4018/978-1-5225-9742-1.ch011
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With the advancement of communication and information technology, the internet has become used as a platform for computing and not only a way of communications networks. Accordingly, the large spread of cloud computing led to the emergence of different privacy implications and data security complexities. In order to enhance data security in the cloud, the authors propose in this chapter the use of an encryption box, which includes different cryptosystems. In fact, this step gives the user the opportunities to encrypt data with an unknown algorithm and makes a private key before the storage of data in the host company servers. Moreover, to manage the encryption database, the authors propose a quantum approach in search based on Grover's algorithm.
Chapter Preview
Top

The Complexities Of Privacy In Cloud Computing

The privacy implications of cloud computing services introduce a number of unidentified parameters in the management, which makes the relation between the service providers and users are unclear. When customers store their data on host companies’ servers, they lose a degree of control over their sensitive information. Accordingly, the responsibility of data security against all menaces including hackers and internal data breaches then falls into the hands of the hosting company rather than the individual user. Moreover, different companies could even readily sale the user’s sensitive information with marketing firms. Therefore, there is a big risk in putting our data in someone else’s hands (Taylor & Francis, 2018).Therefore; many internet users believe that the safest approach is to maintain sensitive information under your own control. One of the problems with cloud computing is that technology is frequently light years ahead of the law. There are many questions about privacy that need to be answered such as:

  • Who are the interferers in cloud computing?

  • Does the user or cloud computing own the data?

  • What are their limits, roles and responsibilities?

  • Can the host deny a user access to their own data?

  • Where is the data reserved?

  • How is the data replicated?

  • What are the relevant legal rules for data processing?

  • How will the host companies meet the expected level of data security and privacy?

  • If the host company goes out of business, what happens to the users’ data it holds?

Complete Chapter List

Search this Book:
Reset