A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 1, Issue 3
Abstract
Cloud computing is a technique to deliver software, storage and processing. It increases system’s capability without changing the existing infrastructure, educating new people or taking license for the softwares. It improves the existing software capabilities and extends the Information Technology resources. In recent years, cloud computing has grown up rapidly and boosted the business concept in IT industry. Despite of all the achievements in cloud computing, security is still a critical challenge in cloud computing paradigm. These challenges include user’s secret data (like health and financial data) loss, leakage and disclosing of privacy. We have studied literature and discussed various model in cloud computing, it shows that privacy/protection in cloud is still immature.
Authors and Affiliations
Abdul Wahid Khan
Adaptive ARA Algorithm (AARA): Proposed Modifications and Experimental Results
Enhanced Model to Improve Memory Based Learning Algorithm
Abstract: Opinion mining/Sentiment analysis is a field of research which focuses on tracking human opinionswritten in natural language. Many companies, Now-a-days, extract opinions from various internet sources (su...
How E-Waste Management can be enhanced using Internet of Things in Developed and Developing Countries
Abstract: With technology advancement, Internet Of things as Next Gen of communication mode. Wearable electrical and electronic and sand printing on paper and wearable material will create people and devices inter and in...
A review of the existing state of Personality prediction of Twitterusers with Machine Learning Algorithms
Abstract: Twitter is a popular social media platform with millions of users. The tweets shared by these usershave recently attracted the attention of researchers from diverse fields. In this paper, we focus primarily onp...
Implementation and Comparison of a New Wormhole Detection Technique with Existing Techniques
Abstract: Mobile Ad hoc networks are increasingly popular these days as they function without major requirements of state of the art infrastructure and the fact that they can function without the need for a centr...