Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

A data-centric view of cloud security

A data-centric view of cloud security

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Data Security in Cloud Computing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Cloud computing offers a massive pool of resources and services that cloud users can utilize for storing and processing their data. The users can flexibly control and reduce their operational expenditures, whereas resources provisioned from the clouds can be dynamically resized to meet their demand and especially budgets. The user, however, has to consider unanticipated and expensive costs from threats associated with attacks aiming for the user's data in the cloud. In this chapter, we discuss the primary causes of new attack vectors that create a multitude of data security issues in clouds. We also discuss specific data security challenges in clouds and provide a classification which can help in an easier understanding.

Chapter Contents:

  • Abstract
  • 1.1 Introduction
  • 1.2 Definitions and terminology
  • 1.3 Need for new methods
  • 1.3.1 Cryptography
  • 1.3.2 Data provenance
  • 1.3.3 Privacy and security laws and regulations
  • 1.3.3.1 Gaps and misalignments
  • 1.3.3.2 Different expectations on technology and control
  • 1.4 Classification of data security issues in cloud computing
  • 1.4.1 Data at rest
  • 1.4.2 Data in use
  • 1.4.3 Data in transit
  • 1.4.4 Cross-cutting issues
  • 1.5 Conclusion
  • References

Inspec keywords: cloud computing; vectors; security of data; pattern classification; resource allocation

Other keywords: cloud computing; attack vectors; data security; cloud users; user data; classification; cloud security; data storage; operational expenditures; data processing; data-centric view

Subjects: Data security; Internet software

Preview this chapter:
Zoom in
Zoomout

A data-centric view of cloud security, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse007e/PBSE007E_ch1-1.gif /docserver/preview/fulltext/books/sc/pbse007e/PBSE007E_ch1-2.gif

Related content

content/books/10.1049/pbse007e_ch1
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address