Privacy in Cloud-Based Computing

Privacy in Cloud-Based Computing

Monjur Ahmed, Nurul I. Sarkar
Copyright: © 2021 |Pages: 15
DOI: 10.4018/978-1-7998-8954-0.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cloud computing, internet of things (IoT), edge computing, and fog computing are gaining attention as emerging research topics and computing approaches in recent years. These computing approaches are rather conceptual and contextual strategies rather than being computing technologies themselves, and in practice, they often overlap. For example, an IoT architecture may incorporate cloud computing and fog computing. Cloud computing is a significant concept in contemporary computing and being adopted in almost every means of computing. All computing architectures incorporating cloud computing are termed as cloud-based computing (CbC) in general. However, cloud computing itself is the basis of CbC because it significantly depends on resources that are remote, and the remote resources are often under third-party ownership where the privacy of sensitive data is a big concern. This chapter investigates various privacy issues associated with CbC. The data privacy issues and possible solutions within the context of cloud computing, IoT, edge computing, and fog computing are also explored.
Chapter Preview
Top

Introduction

The emergence of few recent computing approaches bring new paradigm to computing world. Examples of such computing approaches are Cloud Computing, IoT, Edge Computing and Fog Computing. With numerous benefits and advantageous features, all these computing approaches come with a severe downside – that is, security. Security is a major concern for the above computing approaches from perspectives of business strategy as well as technological and Human Factors. These computing approaches use and/or transfer an organisation’s digital assets (i.e., digital information) off-site for various purposes.

Cloud Computing, IoT, Edge Computing and Fog Computing have become a hype. Organisations are submerging themselves in this hype and – in some cases, discussed later in this chapter– handing over digital assets to third parties. Using computing techniques like Cloud Computing may incorporate moving data into remote computers that are geographically dispersed and crossing political geographic boundaries. Besides, the aforementioned computing techniques use latest technologies, computing devices and gadgets (e.g., smart phone). Electronic end-user gadgets, when become part of a network as an end-user terminal or node, may pose security and privacy concerns. The infrastructural settings of recent computing approaches in terms of location of various elements (e.g., computers, data storage, processing) are crucial factors in information security and privacy. Based on the locations of architectural/infrastructural elements, Cloud Computing, Fog Computing and Edge Computing may introduce a very complex scenario for organisations in terms of Governance, Risk and Compliance (GRC).

Cloud Computing incorporates numerous security concerns (Ahmed & Hossain, 2014; Ahmed, Litchfield & Ahmed, 2014; Ahmed & Litchfield, 2016; Khalil, Khreishah & Azeem, 2014; Aljawarneh & Yassein, 2016; Kar & Mishra, 2016). From an information security and privacy viewpoint, this chapter investigates the computing techniques that use Cloud Computing. Cloud Computing, Fog Computing, Edge Computing, IoT – these are few recent computing techniques/approaches considered in this chapter.

All kinds of CbC uses remote resources and infrastructure that are owned and managed by third party vendors. This results in a situation where customers (individual or organisation) hand over their data to the vendors. Customers’ data and information reside in the vendors infrastructures and servers dispersed geographically around the globe. This results in various complex scenario that are considered as threat to information privacy and security in cyber space. The focal point in this chapter is how CbC may have an impact on the privacy of an organisation’s digital assets.

Complete Chapter List

Search this Book:
Reset