About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International ICST Workshop on Advances in Data and Information Management: Recent Advances of Cloud Computing in Data and Information Management Conference on Communications and Networking in China

Research Article

Cloud Computing Privacy & Security-Global Issues, Challenges, & Mechanisms

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/ChinaCom.2011.6158348,
        author={Saleem-ullah Lar and Xiaofeng Liao and Syed Ali Abbas},
        title={Cloud Computing Privacy \& Security-Global Issues, Challenges, \& Mechanisms},
        proceedings={2nd International ICST Workshop on Advances in Data and Information Management: Recent Advances of Cloud Computing in Data and Information Management  Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={ADIM},
        year={2012},
        month={3},
        keywords={cloud computing security; privacy challenges it outsourcing},
        doi={10.1109/ChinaCom.2011.6158348}
    }
    
  • Saleem-ullah Lar
    Xiaofeng Liao
    Syed Ali Abbas
    Year: 2012
    Cloud Computing Privacy & Security-Global Issues, Challenges, & Mechanisms
    ADIM
    IEEE
    DOI: 10.1109/ChinaCom.2011.6158348
Saleem-ullah Lar1,*, Xiaofeng Liao1, Syed Ali Abbas1
  • 1: Chongqing University
*Contact email: salimbzu@gmail.com

Abstract

Cloud computing is a developing archetype with marvelous momentum, but its exceptional aspects worsening the security and privacy challenges. This article provides an overview of the security and privacy challenges pertinent to public cloud computing and points out considerations organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment. We have also proposed a security mechanism “security as a service” for cloud computing. It also explores the roadblocks and solutions to providing a trustworthy cloud computing environment.

Keywords
cloud computing security; privacy challenges it outsourcing
Published
2012-03-27
Publisher
IEEE
http://dx.doi.org/10.1109/ChinaCom.2011.6158348
Copyright © 2011–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL