Reference Hub1
Cloud Computing Security Issues of Sensitive Data

Cloud Computing Security Issues of Sensitive Data

Manpreet Kaur Walia, Malka N. Halgamuge, Nadeesha D. Hettikankanamage, Craig Bellamy
ISBN13: 9781799853398|ISBN10: 179985339X|EISBN13: 9781799853404
DOI: 10.4018/978-1-7998-5339-8.ch080
Cite Chapter Cite Chapter

MLA

Walia, Manpreet Kaur, et al. "Cloud Computing Security Issues of Sensitive Data." Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, edited by Information Resources Management Association, IGI Global, 2021, pp. 1642-1667. https://doi.org/10.4018/978-1-7998-5339-8.ch080

APA

Walia, M. K., Halgamuge, M. N., Hettikankanamage, N. D., & Bellamy, C. (2021). Cloud Computing Security Issues of Sensitive Data. In I. Management Association (Ed.), Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing (pp. 1642-1667). IGI Global. https://doi.org/10.4018/978-1-7998-5339-8.ch080

Chicago

Walia, Manpreet Kaur, et al. "Cloud Computing Security Issues of Sensitive Data." In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, edited by Information Resources Management Association, 1642-1667. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-5339-8.ch080

Export Reference

Mendeley
Favorite

Abstract

Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications describing 30 observations of cloud computing technology (2010-2017). In the articles, applications of cloud computing include, for instance, business (26%) and the internet of things (IoT; 2%), and the result suggests that some issues are unique to a particular domain (such as business, education, health) and some issues cross all domains. The results suggest that data integrity issues have the highest number of solutions whereas data breaches have the lowest number of solutions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.