TY - GEN
T1 - Towards inclusive privacy protections in the cloud
AU - Sharma, Tanusree
AU - Wang, Tian
AU - Di Giulio, Carlo
AU - Bashir, Masooda
N1 - Publisher Copyright:
© Springer Nature Switzerland AG 2020.
PY - 2020
Y1 - 2020
N2 - The adoption of cloud computing has created tremendous prospects and cost savings for a variety of organizations. Although increasing resources and effort have been devoted to fighting cyber-threats in cloud environments, cloud computing continues to be associated with a range of severe and complex security and privacy issues that may challenge the overall benefits that CSPs offer. While security protections in cloud computing has been widely discussed and comprehensive guidelines have been established, privacy protections in the cloud does not have the same level of focus or set of guideline or framework that has been established. In this paper, we present a systematic review of previous literature related to privacy issues in cloud computing, analyze multiple general privacy frameworks, policies, and principles to highlight the critical need for creating privacy protection criteria’s for cloud computing. Our research and review illustrates that privacy protections focused on cloud computing is deficient and it can serve as an initial guide towards building and improving privacy protections in order to meet cloud privacy requirements and ensure data protection.
AB - The adoption of cloud computing has created tremendous prospects and cost savings for a variety of organizations. Although increasing resources and effort have been devoted to fighting cyber-threats in cloud environments, cloud computing continues to be associated with a range of severe and complex security and privacy issues that may challenge the overall benefits that CSPs offer. While security protections in cloud computing has been widely discussed and comprehensive guidelines have been established, privacy protections in the cloud does not have the same level of focus or set of guideline or framework that has been established. In this paper, we present a systematic review of previous literature related to privacy issues in cloud computing, analyze multiple general privacy frameworks, policies, and principles to highlight the critical need for creating privacy protection criteria’s for cloud computing. Our research and review illustrates that privacy protections focused on cloud computing is deficient and it can serve as an initial guide towards building and improving privacy protections in order to meet cloud privacy requirements and ensure data protection.
KW - Cloud computing
KW - Privacy protection
KW - Privacy risks
UR - http://www.scopus.com/inward/record.url?scp=85094160512&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85094160512&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-61638-0_19
DO - 10.1007/978-3-030-61638-0_19
M3 - Conference contribution
AN - SCOPUS:85094160512
SN - 9783030616373
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 337
EP - 359
BT - Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S and P, SCI, SecMT, and SiMLA, Proceedings
A2 - Zhou, Jianying
A2 - Ahmed, Chuadhry Mujeeb
A2 - Conti, Mauro
A2 - Losiouk, Eleonora
A2 - Au, Man Ho
A2 - Batina, Lejla
A2 - Li, Zhou
A2 - Lin, Jingqiang
A2 - Luo, Bo
A2 - Majumdar, Suryadipta
A2 - Meng, Weizhi
A2 - Ochoa, Martín
A2 - Picek, Stjepan
A2 - Portokalidis, Georgios
A2 - Wang, Cong
A2 - Zhang, Kehuan
PB - Springer
T2 - 2nd ACNS Workshop on Application Intelligence and Blockchain Security, AIBlock 2020, 1st ACNS Workshop on Artificial Intelligence in Hardware Security, AIHWS 2020, 2nd ACNS Workshop on Artificial Intelligence and Industrial IoT Security, AIoTS 2020, 2nd ACNS Workshop on Cloud Security and Privacy, Cloud S and P 2020, 1st ACNS Workshop on Secure Cryptographic Implementation, SCI 2020, 1st ACNS Workshop on Security in Mobile Technologies, SecMT 2020, and 2nd ACNS Workshop on Security in Machine Learning and its Applications, SiMLA 2020, held in parallel with the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020
Y2 - 19 October 2020 through 22 October 2020
ER -