Data Privacy and Confidentiality in Data Breach on Cloud Computing

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The preservation of data security in cloud environment has been identified as one of the key challenges in the field of cloud computing. The breach of data privacy and confidentiality has decreased the shift of enterprises to the cloud environment. However, there is currently no single definition of the concepts of data privacy and data confidentiality that could be generalized. Existing definitions of data privacy and confidentiality are complex, ambiguous and interchangeably used. This lack of clarity leads to confusion and potentially to ineffective and inefficient efforts to secure privacy and confidentiality of data from breach. The aim of this study is threefold. Firstly, this paper tends to explores the existing definitions of data privacy and data confidentiality in cloud computing. Secondly, it purports to examine the association of data breach with data privacy and confidentiality. Lastly,it proposes new operational definitions in order to differentiate between the concepts of data privacy and data confidentiality and data breach. The studies suggested that the concept of data privacy and data confidentiality in cloud computing is closely related and both are prone to breach within cloud security domain. Therefore, devising strategies and techniques to secure privacy and confidentiality of data can ultimately results in reduction of data breach.



  • Keywords

    Cloud computing, Data Breach,Data Privacy, Data Confidentiality

  • References

      [1] M. Armbrust et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, p. 50, Apr. 2010.

      [2] D. Gaurav Pal, R. Krishna, P. Srivastava, S. Kumar, M. Bag, and V. Singh, “A Novel Open Security Framework for Cloud Computing,” Int. J. Cloud Comput. Serv. Sci., vol. 1, no. 2, pp. 42–52, 2012.

      [3] A. Kumar, “World of Cloud Computing and Security,” Int. J. Cloud Comput. Serv. Sci., vol. 1, no. 2, pp. 53–58, 2012.

      [4] A. Sarwar and M. N. Khan, “A Review of Trust Aspects in Cloud Computing Security,” Int. J. Cloud Comput. Serv. Sci., vol. 2, no. 2, pp. 116–122, 2013.

      [5] M. Theoharidou, N. Papanikolaou, S. Pearson, and D. Gritzalis, “Privacy Risk, Security, Accountability in the Cloud,” in 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, 2013, pp. 177–184.

      [6] D. Svantesson and R. Clarke, “Privacy and consumer risks in cloud computing,” Comput. Law Secur. Rev., vol. 26, no. 4, pp. 391–397, Jul. 2010.

      [7] M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The New Casper: A Privacy-Aware Location-Based Database Server,” in 2007 IEEE 23rd International Conference on Data Engineering, 2007, pp. 1499–1500.

      [8] S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. 2011.

      [9] R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, “Preserving User Location Privacy in Mobile Data Management Infrastructures,” Springer, Berlin, Heidelberg, 2006, pp. 393–412.

      [10] F. Rocha, S. Abreu, and M. Correia, “The Final Frontier: Confidentiality and Privacy in the Cloud,” Computer (Long. Beach. Calif)., vol. 44, no. 9, pp. 44–50, Sep. 2011.

      [11] R. Gellman, “Privacy in the clouds: risks to privacy and confidentiality from cloud computing,” Proc. World Priv. forum, pp. 1–26, 2009.

      [12] Cloud Security Alliance, “Top Threats to Cloud Computing V1.0,” Cloud Security Alliance., 2010. [Online]. Available:

      [13] Cloud Security Alliance, “The Notorious Nine. Cloud Computing Top Threats in 2013,” Security, 2013. [Online]. Available:

      [14] Cloud Security Alliance, “The Treacherous 12 Cloud Computing Top Threats in 2016,” Security, no. February, pp. 1–34, 2016.

      [15] C. A. Ardagna, R. Asal, E. Damiani, and Q. H. Vu, “From Security to Assurance in the Cloud,” ACM Comput. Surv., vol. 48, no. 1, pp. 1–50, Jul. 2015.

      [16] X. Ma, “Security Concerns in Cloud Computing,” in 2012 Fourth International Conference on Computational and Information Sciences, 2012, pp. 1069–1072.

      [17] T. Mather, S. Kumaraswamy, and S. Latif, Cloud security and privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly, 2009.

      [18] D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” in 2012 International Conference on Computer Science and Electronics Engineering, 2012, pp. 647–651.

      [19] S. Pearson and A. Charlesworth, “Accountability as a Way Forward for Privacy Protection in the Cloud,” Springer, Berlin, Heidelberg, 2009, pp. 131–144.

      [20] Y. Chou, O. Levina, and J. Oetting, “Enforcing confidentiality in a SaaS cloud environment,” in 2011 19thTelecommunications Forum (TELFOR) Proceedings of Papers, 2011, pp. 90–93.

      [21] M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, “Security and Privacy in Cloud Computing: A Survey,” in 2010 Sixth International Conference on Semantics, Knowledge and Grids, 2010, pp. 105–112.

      [22] Z. Xiao and Y. Xiao, “Security and Privacy in Cloud Computing,” IEEE Commun. Surv. Tutorials, vol. 15, no. 2, pp. 843–859, 2013.

      [23] D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, Mar. 2012.

      [24] S. Pearson and A. Benameur, “Privacy, Security and Trust Issues Arising from Cloud Computing,” in 2010 IEEE Second International Conference on Cloud Computing Technology and Science, 2010, pp. 693–702.

      [25] S. Pearson and G. Yee, Privacy and Security for Cloud Computing. London: Springer London, 2013.

      [26] V. Shandilya and S. Shiva, “Security in the cloud based systems: Structure and breaches,” in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), 2013, pp. 542–547.

      [27] D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, and P. Dhavachelvan, “A novel framework to prevent privacy breach in cloud data storage area service,” in 2013 International Conference on Green High Performance Computing (ICGHPC), 2013, pp. 1–4.

      [28] M. Jouini and L. B. A. Rabai, “Surveying and Analyzing Security Problems in Cloud Computing Environments,” in 2014 Tenth International Conference on Computational Intelligence and Security, 2014, pp. 689–693.

      [29] D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes, M. M. Freire, and P. R. M. Inácio, “Security issues in cloud environments: a survey,” Int. J. Inf. Secur., vol. 13, no. 2, pp. 113–170, Apr. 2014.

      [30] D. Kolevski and K. Michael, “Cloud computing data breaches a socio-technical review of literature,” in 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, pp. 1486–1495.




Article ID: 22035
DOI: 10.14419/ijet.v7i4.19.22035

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.