Please use this identifier to cite or link to this item:
metadata.conference.dc.title: Privacy and Security of Cloud Computing: A Comprehensive Review of Techniques and Challenges
metadata.conference.dc.contributor.*: Marwan Adnan Darwish
Eiad Yafi
Abdullah H. Almasri
Megat F Zuhairi
metadata.conference.dc.subject: Cloud Computing
identity cloud management
steganography 7-Jun-2018
metadata.conference.dc.description.abstract: Abstract: The use of cloud computing is rapidly increasing in various range of services and it is seen on trend to revolutionize the way the IT companies doing businesses. The recent advances of mobile, social media companies and online busi¬nesses have given rise to success and propagation of cloud environment. However, when outsourcing the data to a third party, major challenges cloud-computing model jeopardizes are privacy and security issues and threats on data security and reliability. These threats constitute on data breaches, loss of control, unauthorized uses at the different layers of the cloud models and these issues hinder the adoption of cloud and slow down acceptance in many sectors in IT. In this review we present and summarize some major articles in cloud computing and its multiple layers with a focus on security and privacy problems (such as integrity, confidentiality and data privacy). We also intend to re¬view some approaches related to identity cloud management, cryptography and steganography techniques in cloud computing.
metadata.conference.dc.identifier.uri: International Conference on Information and Communication Technology
metadata.conference.dc.conference.year: 2018
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
Privacy and security of cloud computing.pdf2.2 MBAdobe PDFView/Open    Request a copy

Items in UniKL IR are protected by copyright, with all rights reserved, unless otherwise indicated.