Explore chapters and articles related to this topic
Financial analysis for mobile and cloud applications
Published in Noura Metawa, Mohamed Elhoseny, Aboul Ella Hassanien, M. Kabir Hassan, Expert Systems in Finance, 2019
Jennifer Brodmann, Makeen Huda
Shaikh and Haider (2011) maintain that the security concerns inherent in cloud computing are the only obstacles standing in the way of its widespread implementation. They survey the recent literature on the security threats that users face when adopting cloud computing and identify the most important ones to be “data loss, leakage of data, client‘s trust, user’s authentication, malicious users handling, wrong usage of cloud computing and its services, and hijacking of sessions while accessing data.” Data security is a major concern because of data breaches, especially since firms can be exposed to legal repercussions from a data breach or technical problem. To remedy these concerns, Shaikh and Haider recommend the use of a free, publicly available downloadable set of tools issued by the non-profit Cloud Security Alliance, designed “to help organizations create public and private clouds that comply with industry standards for accepted governance, risk, and compliance best practices.”
Innovation Opportunities through Internet of Things (IoT) for Smart Cities
Published in Pradeep Tomar, Gurjit Kaur, Green and Smart Technologies for Smart Cities, 2019
Rajalakshmi Krishnamurthi, Anand Nayyar, Arun Solanki
Veracity: the veracity refers to the quality of data, security and privacy of the information gathered. The data quality indicates error and free data collected from the smart city IoT systems. Data security involves a procedure to avoid data misuse or tampering by malicious attackers and intruders. The data privacy provides originality, trust and authenticity of information gathered from the smart city environment.
A Dynamic Cloud Computing Architecture for Cloud-Assisted Internet of Things in the Era of Big Data
Published in Yulei Wu, Fei Hu, Geyong Min, Albert Y. Zomaya, Big Data and Computational Intelligence in Networking, 2017
Data security emphasizes authentication for accessing data and applications and it protects data against an adversary from internal/external access to data. Data privacy is another challenge in Cloud computing that emphasizes who are authorized to use the outsourced data in the Cloud [7].
Sharing secured data on peer-to-peer applications using attribute-based encryption
Published in Journal of Information and Telecommunication, 2021
Nhan Tam Dang, Ha Manh Tran, Sinh Van Nguyen, Marcin Maleszka, Hai-Duong Le
Data security includes the process of protecting data from unauthorized access and data corruption throughout each data life cycle stage. Several organizations around the globe heavily invest in cybersecurity capabilities to protect their critical assets. Thus data security is a must-have in any enterprise and becomes the research field that attracts many researchers and companies. The basic idea is to ensure that data can be stored in a form that no one can understand. Thus, even if the system is compromised and data gets stolen, it is still considered somewhat safe if no one can devise a way to transform the scrambled data back into its original state.