TY - JOUR
T1 - Privacy and Security of Cloud Computing
T2 - A Comprehensive Review of Techniques and Challenges
AU - Darwish, Marwan Adnan
AU - Yafi, Eiad
AU - Almasri, A. H.
AU - Zuhairi, M. F.
PY - 2018/11/26
Y1 - 2018/11/26
N2 - Cloud computing usage is rapidly increasing in a various range of services and it is seen on trend to revolutionize the way the IT companies doing businesses. The recent advances in mobile, social media companies and online businesses have given rise to success and propagation for the environment of the cloud. However, When uploading the users' data from the local device to the nature of the cloud that considered as a third party , major challenges cloud-computing model jeopardizes privacy and security issues and threats on data security and reliability. These threats constitute data breaches, loss of control, unauthorized uses at the different layers of the cloud models and these issues hinder the adoption of cloud and slow down acceptance in many sectors in IT. In this review, we present and summarize major articles in cloud computing and its multiple layers with a focus on security and privacy challenges (such as integrity, confidentiality and data privacy). We also intend to review the latest approaches regarding identity management inside the cloud, cryptography and steganography techniques that have been used inside the cloud platforms.
AB - Cloud computing usage is rapidly increasing in a various range of services and it is seen on trend to revolutionize the way the IT companies doing businesses. The recent advances in mobile, social media companies and online businesses have given rise to success and propagation for the environment of the cloud. However, When uploading the users' data from the local device to the nature of the cloud that considered as a third party , major challenges cloud-computing model jeopardizes privacy and security issues and threats on data security and reliability. These threats constitute data breaches, loss of control, unauthorized uses at the different layers of the cloud models and these issues hinder the adoption of cloud and slow down acceptance in many sectors in IT. In this review, we present and summarize major articles in cloud computing and its multiple layers with a focus on security and privacy challenges (such as integrity, confidentiality and data privacy). We also intend to review the latest approaches regarding identity management inside the cloud, cryptography and steganography techniques that have been used inside the cloud platforms.
U2 - 10.14419/ijet.v7i4.29.26263
DO - 10.14419/ijet.v7i4.29.26263
M3 - Article
SN - 2349-0918
VL - 7
SP - 239
EP - 246
JO - International Journal of Engineering Trends and Technology
JF - International Journal of Engineering Trends and Technology
IS - 4.29
ER -