Skip to main content

Privacy and Security Requirements of Data Intensive Computing in Clouds

  • Chapter
  • First Online:
Book cover Handbook of Data Intensive Computing

Abstract

The scale and cost efficiencies provided by clouds make them ideal platforms for handling data intensive applications in variety of different sectors including e-health, e-commerce, and surveillance applications. This chapter investigates the privacy and security issues of large data sets that are stored and processed in cloud computing systems. If the experience gained from web-based transaction management systems is any indication, the safety of data held by cloud computing systems is not impregnable. There are various factors contributing to the data insecurity including the data handling policies adopted by the cloud operators, best practices adopted by the cloud provider in recycling used storage elements, and characteristics of the data handled by the clouds.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. “National Institute of Standards and Technology,” http://www.nist.gov/.

  2. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” University of California at Berkeley, Tech. Rep., Feb. 2009.

    Google Scholar 

  3. “FedRAMP: Governmentwide Approach to Cloud Security,” http://www.cio.gov/pages-nonnews.cfm/page/Federal-Risk-and-Authorization-Management-Program-FedRAMP.

  4. D. Abramson, R. Buyya, and J. Giddy, “A computational economy for grid computing and its implementation in the nimrod-g resource broker,” in Future Generation Computer Systems (FGCS) Journal, vol. 18, no. 8, 2002, pp. 1061–1074.

    Google Scholar 

  5. R. T. Kouzes, G. A. Anderson, S. T. Elbert, I. Gorton, and D. K. Gracio, “The changing paradigm of data-intensive computing,” Computer, vol. 42, pp. 26–34, 2009.

    Article  Google Scholar 

  6. P. Mell and T. Grace, “The nist definition of cloud computing, national institute of standards and technology,” 2009.

    Google Scholar 

  7. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” Cryptology ePrint Archive, Report 2009/081, 2009.

    Google Scholar 

  8. R. L. Grossman, “The case for cloud computing,” It Professional, vol. 11, pp. 23–27, 2009.

    Article  MathSciNet  Google Scholar 

  9. R. L. Grossman and Y. Gu, “On the varieties of clouds for data intensive computing,” Mar. 2009.

    Google Scholar 

  10. T. Wood, G. Tarasuk-levin, P. Shenoy, P. Desnoyers, E. Cecchet, and M. D. Corner, “Memory buddies: Exploiting page sharing for smart colocation,” in 5th ACM International Conference on Virtual Execution Environments, 2009.

    Google Scholar 

  11. D. S. Linthicum, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide, 1st ed. Addison-Wesley Professional, 2009.

    Google Scholar 

  12. “Jericho Cloud Cube Model,” http://www.opengroup.org/jericho/cloud_cube_model_v1.0.pdf.

  13. C. A. Yfoulis and A. Gounaris, “Tc3 health case study: Amazon web services,” 2009.

    Google Scholar 

  14. R. Gellman, “Privacy in the clouds: Risks to privacy and confidentiality from cloud computing,” Tech. Rep., Feb. 2009.

    Google Scholar 

  15. D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, “Eucalyptus: A technical report on an elastic utility computing architecture linking your programs to useful systems,” 2008.

    Google Scholar 

  16. “Amazon Web Services.” http://aws.amazon.com.

  17. J. Dean and S. Ghemawat, “Mapreduce: simplified data processing on large clusters,” Commununications of the ACM, vol. 51, January 2008.

    Google Scholar 

  18. D. Borthakur, The Hadoop Distributed File System: Architecture and Design, The Apache Software Foundation, 2007.

    Google Scholar 

  19. “Google AppEngine.” http://code.google.com/appengine.

  20. “Microsoft Azure: Windows Azure.” http://www.microsoft.com/windowsazure/.

  21. “Proofpoint.” http://www.proofpoint.com.

  22. “Salesforce: CRM & Cloud Computing.” http://www.salesforce.com.

  23. “Sun Open cloud Platform.” http://www.sun.com.

  24. “Rackspace: Rackspace Managed Hosting,” http://www.rackspace.com/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muthucumaru Maheswaran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Nourian, A., Maheswaran, M. (2011). Privacy and Security Requirements of Data Intensive Computing in Clouds. In: Furht, B., Escalante, A. (eds) Handbook of Data Intensive Computing. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1415-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-1415-5_19

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-1414-8

  • Online ISBN: 978-1-4614-1415-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics