Security- and Privacy-Aware Computing in Cloud With User Mobility: An Extensive Review

Security- and Privacy-Aware Computing in Cloud With User Mobility: An Extensive Review

Sayani Sen (Sarojini Naidu College for Women, Dumdum, West Bengal, India), Sathi Roy (Asian International School, Howrah, West Bengal, India), Suparna Biswas (Maulana Abul kalam Azad University of Technology, West Bengal, India) and Chandreyee Chowdhury (Jadavpur University, India)
Copyright: © 2020 |Pages: 20
DOI: 10.4018/978-1-7998-1082-7.ch001


Today's computational model has been undergoing a huge paradigm shift from personalized, local processing using local processing unit (LPU) to remote processing at cloud servers located globally. Advances in sensor-based smart applications such as smart home, smart health, smart transport, smart environment monitoring, etc. are generating huge data which needs to stored, pre-processed, analyzed using machine learning and deep learning techniques, which are resource-hungry, to generate results to be saved for future reference, and all these need to be done in real time, with scalability support satisfying user data privacy and security that may vary from application to application. In smart application like remote health monitoring and support, patient data needs utmost privacy besides confidentiality, integrity, and availability.
Chapter Preview

Introduction To Security And Privacy Issues Of User Data On Cloud

The interpretation of ‘Cloud Computing’ according to the National Institute of Standard and Technology (NIST) is cloud computing is a platform which enables on-demand, universal, convenient network access to a shared pool of configurable computing resources. This can be used for minimal management cost and service provider interaction (Leavitt, 2009). For a Cloud Computing environment, both resources and applications are delivered as services with minimal cost by using the underlying Internet connection. The three most well-known services of cloud computing (depicted in Figure 1) are defined below (Amini et al, 2015).

  • 1.

    Software as a service (SaaS): SaaS represent the largest cloud market, where the software and related data of the software are deployed by the cloud service provider. Most of the SaaS applications can be run directly through the web browser without any installations or download.

  • 2.

    Platform as a service (PaaS): In PaaS the service provider makes services easy to the user to perform a specific task. It makes development, testing, and deployment of software easy and cost-effective.

  • 3.

    Infrastructure as a service (IaaS): IaaS provides storage and virtual machine to improve the business applications of the user (Leavitt, 2009).

Figure 1.

Services of cloud computing


Cloud computing has few characteristics like service on-demand, worldwide network access, location independence, resource elasticity, and security. These merits make cloud computing more attractive to both the world industrial and academic research. However, there are few problems to be solved for the enterprises as well as personal users regarding data storage and deployment of the applications in a cloud computing environment. Data security is one of the most significant barriers in the cloud computing environment. It is consisting of the issues of trust, privacy and legal matters as discussed in (Shah et al, 2008). There are three different accesses to cloud computing which is public, private and hybrid cloud computing environments. The public cloud environment is the service provider’s property which can be used by anyone. Private cloud is the property of the company which can be accessed by the authorized user, whereas, combination of private and public cloud is called the hybrid cloud (Leavitt, 2009).

Complete Chapter List

Search this Book: