Security and Privacy Issues in Cloud Storage
- URL: http://arxiv.org/abs/2401.04076v2
- Date: Sun, 14 Jan 2024 20:12:02 GMT
- Title: Security and Privacy Issues in Cloud Storage
- Authors: Norah Asiri,
- Abstract summary: The cloud computing inherits the traditional potential security and privacy threats besides its own issues due to its unique structures.
Some threats related to cloud computing are the insider malicious attacks from the employees that even sometime the provider unconscious about.
In this review, we spot the light on the most security and privacy issues which can be attributed as gaps that sometimes the consumers or even the enterprises are not aware of.
- Score: 0.0
- License: http://creativecommons.org/publicdomain/zero/1.0/
- Abstract: Even with the vast potential that cloud computing has, so far, it has not been adopted by the consumers with the enthusiasm and pace that it be worthy; this is a very reason statement why consumers still hesitated of using cloud computing for their sensitive data and the threats that prevent the consumers from shifting to use cloud computing in general and cloud storage in particular. The cloud computing inherits the traditional potential security and privacy threats besides its own issues due to its unique structures. Some threats related to cloud computing are the insider malicious attacks from the employees that even sometime the provider unconscious about, the lack of transparency of agreement between consumer and provider, data loss, traffic hijacking, shared technology and insecure application interface. Such threats need remedies to make the consumer use its features in secure way. In this review, we spot the light on the most security and privacy issues which can be attributed as gaps that sometimes the consumers or even the enterprises are not aware of. We also define the parties that involve in scenario of cloud computing that also may attack the entire cloud systems. We also show the consequences of these threats.
Related papers
- Managing Bandwidth: The Key to Cloud-Assisted Autonomous Driving [73.55745551827229]
We argue that we can, and must, rely on the cloud for real-time control systems like self-driving cars.
We identify an opportunity to offload parts of time-sensitive and latency-critical compute to the cloud.
arXiv Detail & Related papers (2024-10-21T17:32:36Z) - K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data [0.0]
In public cloud environments while data is encrypted, the cloud service provider typically controls the encryption keys.
This situation makes traditional privacy-preserving classification systems inadequate.
We propose a secure k nearest neighbor classification algorithm for encrypted, outsourced data.
arXiv Detail & Related papers (2024-07-05T19:44:17Z) - Cloud Security and Security Challenges Revisited [0.0]
We revisit attacks on Cloud services and Cloud-related attack vectors that have been published in recent years.
Based on these findings, we apply a security metric in order to rank all these Cloud-related security challenges concerning their severity.
arXiv Detail & Related papers (2024-05-18T17:42:02Z) - Mitigating Data Sharing in Public Cloud using Blockchain [0.0]
We propose a secure data ecosystem in the cloud with the key aspects being Data Rights, Data Sharing, and Data Validation.
This will ensure that existing public cloud-based systems can easily deploy blockchain enhancing trustworthiness and non-repudiation of cloud data.
arXiv Detail & Related papers (2024-04-21T13:12:44Z) - Artificial Intelligence enhanced Security Problems in Real-Time Scenario using Blowfish Algorithm [0.0]
"The cloud" refers to a collection of interconnected computing resources made possible by an extensive, real-time communication network like the internet.
The exponential expansion of cloud computing has made the rapid expansion of cloud services very remarkable.
Models of security that are relevant to cloud computing include confidentiality, authenticity, accessibility, data integrity, and recovery.
arXiv Detail & Related papers (2024-04-14T15:38:34Z) - Privacy-preserving Optics for Enhancing Protection in Face De-identification [60.110274007388135]
We propose a hardware-level face de-identification method to solve this vulnerability.
We also propose an anonymization framework that generates a new face using the privacy-preserving image, face heatmap, and a reference face image from a public dataset as input.
arXiv Detail & Related papers (2024-03-31T19:28:04Z) - Leveraging AI Planning For Detecting Cloud Security Vulnerabilities [15.503757553097387]
Cloud computing services provide scalable and cost-effective solutions for data storage, processing, and collaboration.
Access control misconfigurations are often the primary driver for cloud attacks.
We develop a PDDL model for detecting security vulnerabilities which can for example lead to widespread attacks such as ransomware.
arXiv Detail & Related papers (2024-02-16T03:28:02Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Protecting User Privacy in Online Settings via Supervised Learning [69.38374877559423]
We design an intelligent approach to online privacy protection that leverages supervised learning.
By detecting and blocking data collection that might infringe on a user's privacy, we can restore a degree of digital privacy to the user.
arXiv Detail & Related papers (2023-04-06T05:20:16Z) - Privacy Explanations - A Means to End-User Trust [64.7066037969487]
We looked into how explainability might help to tackle this problem.
We created privacy explanations that aim to help to clarify to end users why and for what purposes specific data is required.
Our findings reveal that privacy explanations can be an important step towards increasing trust in software systems.
arXiv Detail & Related papers (2022-10-18T09:30:37Z) - Edge-Cloud Polarization and Collaboration: A Comprehensive Survey [61.05059817550049]
We conduct a systematic review for both cloud and edge AI.
We are the first to set up the collaborative learning mechanism for cloud and edge modeling.
We discuss potentials and practical experiences of some on-going advanced edge AI topics.
arXiv Detail & Related papers (2021-11-11T05:58:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.