Privacy in Cloud-Based Computing

Privacy in Cloud-Based Computing

Monjur Ahmed, Nurul I. Sarkar
Copyright: © 2021 |Pages: 15
ISBN13: 9781799889540|ISBN10: 1799889548|EISBN13: 9781799889557
DOI: 10.4018/978-1-7998-8954-0.ch006
Cite Chapter Cite Chapter

MLA

Ahmed, Monjur, and Nurul I. Sarkar. "Privacy in Cloud-Based Computing." Research Anthology on Privatizing and Securing Data, edited by Information Resources Management Association, IGI Global, 2021, pp. 154-168. https://doi.org/10.4018/978-1-7998-8954-0.ch006

APA

Ahmed, M. & Sarkar, N. I. (2021). Privacy in Cloud-Based Computing. In I. Management Association (Ed.), Research Anthology on Privatizing and Securing Data (pp. 154-168). IGI Global. https://doi.org/10.4018/978-1-7998-8954-0.ch006

Chicago

Ahmed, Monjur, and Nurul I. Sarkar. "Privacy in Cloud-Based Computing." In Research Anthology on Privatizing and Securing Data, edited by Information Resources Management Association, 154-168. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-8954-0.ch006

Export Reference

Mendeley
Favorite

Abstract

Cloud computing, internet of things (IoT), edge computing, and fog computing are gaining attention as emerging research topics and computing approaches in recent years. These computing approaches are rather conceptual and contextual strategies rather than being computing technologies themselves, and in practice, they often overlap. For example, an IoT architecture may incorporate cloud computing and fog computing. Cloud computing is a significant concept in contemporary computing and being adopted in almost every means of computing. All computing architectures incorporating cloud computing are termed as cloud-based computing (CbC) in general. However, cloud computing itself is the basis of CbC because it significantly depends on resources that are remote, and the remote resources are often under third-party ownership where the privacy of sensitive data is a big concern. This chapter investigates various privacy issues associated with CbC. The data privacy issues and possible solutions within the context of cloud computing, IoT, edge computing, and fog computing are also explored.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.