Reference Hub4
Cloud Computing Security Issues of Sensitive Data

Cloud Computing Security Issues of Sensitive Data

Manpreet Kaur Walia, Malka N. Halgamuge, Nadeesha D. Hettikankanamage, Craig Bellamy
ISBN13: 9781522573357|ISBN10: 1522573356|ISBN13 Softcover: 9781522590552|EISBN13: 9781522573364
DOI: 10.4018/978-1-5225-7335-7.ch004
Cite Chapter Cite Chapter

MLA

Walia, Manpreet Kaur, et al. "Cloud Computing Security Issues of Sensitive Data." Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, edited by Surjit Singh and Rajeev Mohan Sharma, IGI Global, 2019, pp. 60-84. https://doi.org/10.4018/978-1-5225-7335-7.ch004

APA

Walia, M. K., Halgamuge, M. N., Hettikankanamage, N. D., & Bellamy, C. (2019). Cloud Computing Security Issues of Sensitive Data. In S. Singh & R. Mohan Sharma (Eds.), Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization (pp. 60-84). IGI Global. https://doi.org/10.4018/978-1-5225-7335-7.ch004

Chicago

Walia, Manpreet Kaur, et al. "Cloud Computing Security Issues of Sensitive Data." In Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, edited by Surjit Singh and Rajeev Mohan Sharma, 60-84. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7335-7.ch004

Export Reference

Mendeley
Favorite

Abstract

Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications describing 30 observations of cloud computing technology (2010-2017). In the articles, applications of cloud computing include, for instance, business (26%) and the internet of things (IoT; 2%), and the result suggests that some issues are unique to a particular domain (such as business, education, health) and some issues cross all domains. The results suggest that data integrity issues have the highest number of solutions whereas data breaches have the lowest number of solutions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.