Abstract
The scale and cost efficiencies provided by clouds make them ideal platforms for handling data intensive applications in variety of different sectors including e-health, e-commerce, and surveillance applications. This chapter investigates the privacy and security issues of large data sets that are stored and processed in cloud computing systems. If the experience gained from web-based transaction management systems is any indication, the safety of data held by cloud computing systems is not impregnable. There are various factors contributing to the data insecurity including the data handling policies adopted by the cloud operators, best practices adopted by the cloud provider in recycling used storage elements, and characteristics of the data handled by the clouds.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
“National Institute of Standards and Technology,” http://www.nist.gov/.
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” University of California at Berkeley, Tech. Rep., Feb. 2009.
“FedRAMP: Governmentwide Approach to Cloud Security,” http://www.cio.gov/pages-nonnews.cfm/page/Federal-Risk-and-Authorization-Management-Program-FedRAMP.
D. Abramson, R. Buyya, and J. Giddy, “A computational economy for grid computing and its implementation in the nimrod-g resource broker,” in Future Generation Computer Systems (FGCS) Journal, vol. 18, no. 8, 2002, pp. 1061–1074.
R. T. Kouzes, G. A. Anderson, S. T. Elbert, I. Gorton, and D. K. Gracio, “The changing paradigm of data-intensive computing,” Computer, vol. 42, pp. 26–34, 2009.
P. Mell and T. Grace, “The nist definition of cloud computing, national institute of standards and technology,” 2009.
C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” Cryptology ePrint Archive, Report 2009/081, 2009.
R. L. Grossman, “The case for cloud computing,” It Professional, vol. 11, pp. 23–27, 2009.
R. L. Grossman and Y. Gu, “On the varieties of clouds for data intensive computing,” Mar. 2009.
T. Wood, G. Tarasuk-levin, P. Shenoy, P. Desnoyers, E. Cecchet, and M. D. Corner, “Memory buddies: Exploiting page sharing for smart colocation,” in 5th ACM International Conference on Virtual Execution Environments, 2009.
D. S. Linthicum, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide, 1st ed. Addison-Wesley Professional, 2009.
“Jericho Cloud Cube Model,” http://www.opengroup.org/jericho/cloud_cube_model_v1.0.pdf.
C. A. Yfoulis and A. Gounaris, “Tc3 health case study: Amazon web services,” 2009.
R. Gellman, “Privacy in the clouds: Risks to privacy and confidentiality from cloud computing,” Tech. Rep., Feb. 2009.
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, “Eucalyptus: A technical report on an elastic utility computing architecture linking your programs to useful systems,” 2008.
“Amazon Web Services.” http://aws.amazon.com.
J. Dean and S. Ghemawat, “Mapreduce: simplified data processing on large clusters,” Commununications of the ACM, vol. 51, January 2008.
D. Borthakur, The Hadoop Distributed File System: Architecture and Design, The Apache Software Foundation, 2007.
“Google AppEngine.” http://code.google.com/appengine.
“Microsoft Azure: Windows Azure.” http://www.microsoft.com/windowsazure/.
“Proofpoint.” http://www.proofpoint.com.
“Salesforce: CRM & Cloud Computing.” http://www.salesforce.com.
“Sun Open cloud Platform.” http://www.sun.com.
“Rackspace: Rackspace Managed Hosting,” http://www.rackspace.com/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Nourian, A., Maheswaran, M. (2011). Privacy and Security Requirements of Data Intensive Computing in Clouds. In: Furht, B., Escalante, A. (eds) Handbook of Data Intensive Computing. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1415-5_19
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1415-5_19
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1414-8
Online ISBN: 978-1-4614-1415-5
eBook Packages: Computer ScienceComputer Science (R0)