Skip to main content

Cloud Computing and Security in the Future

  • Chapter
  • First Online:
Guide to Security Assurance for Cloud Computing

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

We are starting to depend more and more on ‘cloud’ technology, in business and in our own personal lives. With so much personal data being stored in our personal clouds, questions are being asked about where the responsibility lies for the protection of data. For instance, is it with the consumer or with the provider? People have a right to know where their files are being stored and what is protecting them. The same goes for the consumer. They are obligated to ensure that their passwords are of a good strength and that they are safe while browsing the web, especially on public networks. The personal cloud industry is on the rise, and if the experts are correct in their predictions, the business world will be a better place for it, better in terms of portability and flexibility. The power to set your office up wherever you happen to be sitting, anywhere in the world, will be what personal cloud providers are offering. This is the future for cloud computing. Security and privacy are now more relevant than ever. This chapter examines the issues around cloud data protection and security and also investigates if the current Data Protection Act defines sufficient guidelines for data controllers on how they should collect and store user information in relation to thin-based clients using online or cloud-based service or if a lack of clarity in the Data Protection Act could cause these services to misuse the user’s data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amazon Web Services (2013) Amazon Elastic Compute Cloud (Amazon EC2). http://aws.amazon.com/ec2/

  2. Balaciart D (2014) What The Future Of Cloud Computing Will Bring | clouderPC. clouderPC, Trivandrum, India. Available at: http://www.clouderpc.com/the-future-of-cloud-computing-includes-combining-all-services-together/#.VD67AGewIiY

  3. Behl A, Behl K (2012, Oct. 30 2012–Nov. 2 2012) An analysis of cloud computing security issues. Paper presented at the Information and Communication Technologies (WICT), 2012 World Congress on

    Google Scholar 

  4. Borrill S (2014) Telstra Keynote Urges CIOs to Master the Art of Shaping Cloud ServicesTelecomsTalk. Telecomstalk.com. Available at: http://www.telecomstalk.com/?p=3823

  5. Caso, E. (2014). The Rise of the Personal Cloud | WIRED. [online] WIRED. Available at: http://www.wired.com/2014/01/rise-personal-cloud/

  6. Cisco (2014) Cisco visual networking index: global mobile data traffic forecast update, 2013–2018. Available: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11-520862.pdf

  7. Chen D, Hong Z (2012, 23–25 March 2012) Data security and privacy protection issues in cloud computing. Paper presented at the Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, Hangzhou, China

    Google Scholar 

  8. Data Protection Commissioner (2005) Are you a data controller? Available: http://www.dataprotection.ie/docs/Are-you-a-Data-Controller-/43.htm

  9. Data Protection Commissioner (2010) Data security guidance. http://www.dataprotection.ie/viewdoc.asp?DocID=1091

  10. Data Protection Commissioner (2014) Global privacy sweep raises concerns about mobile apps. Available: http://www.dataprotection.ie/viewdoc.asp?Docid=1456&Catid=66&StartDate=01+January+2014&m=

  11. Dinadayalan P, Jegadeeswari S, Gnanambigai D (2014, Feb. 27 2014–March 1 2014) Data security issues in cloud environment and solutions. Paper presented at the Computing and Communication Technologies (WCCCT), 2014 World Congress on, Tiruchirappalli, India

    Google Scholar 

  12. Djemame K, Armstrong D, Guitart J, Macias M (2014) A risk assessment framework for cloud computing. Cloud Computing, IEEE Transactions on, PP(99), 1–1

    Google Scholar 

  13. Gallagher S (2014) Update: what Jennifer Lawrence can teach you about cloud security. Ars Technica, Boston. http://arstechnica.com/security/2014/09/what-jennifer-lawrence-can-teach-you-about-cloud-security/

  14. Grance T, Mell P (2011) The NIST definition of cloud computing. National Institute for Standards and Technology, Gaithersburg, Tamil Nadu, India

    Google Scholar 

  15. Homer T (2014) 2020 vision for cloud services to the enterprise what service should the enterprise expect and demand by 2020?, 1st edn. [ebook] EMEA, Quinta do Lago

    Google Scholar 

  16. ICS (2015) ICS predicts data protection will be a hot topic in 2015. http://www.ics.ie/news/view/1341

  17. Intel (2015) Intel’s vision of the ongoing shift to cloud computing. Available: http://www.intel.ie/content/dam/www/public/us/en/documents/white-papers/cloud-computing-intel-cloud-2015-vision.pdf

  18. Iyler K, Easwar D (2013) Cloud computing and modelling of cash flows. In: International conference on business analytics, Lisbon, Portugal, 18–21 January 2013, pp 34–42

    Google Scholar 

  19. Jadeja Y, Modi K (2012, 21–22 March 2012) Cloud computing – concepts, architecture and challenges. Paper presented at the Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on

    Google Scholar 

  20. Kelyman B (2014) How I secure my personal cloud. Dark Reading. Available at: http://www.darkreading.com/cloud-security/how-i-secure-my-personal-cloud/d/d-id/1113941

  21. Keshavarzi A, Haghighat AT, Bohlouli M (2013, 12–14 Sept. 2013) Research challenges and prospective business impacts of cloud computing: a survey. Paper presented at the Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2013 IEEE 7th International Conference on, Berlin, Germany

    Google Scholar 

  22. Kulkarni G, Chavan N, Chandorkar R, Waghmare R, Palwe R (2012) Cloud security challenges. Paper presented at the Telecommunication Systems, Services, and Applications (TSSA), 2012 7th international conference on, New York, 30–31 Oct 2012

    Google Scholar 

  23. McKendrick J (2013) 10 quotes on cloud computing that really say it all. http://www.forbes.com/sites/joemckendrick/2013/03/24/10-quotes-on-cloud-computing-that-really-say-it-all/, 29th September 2013, Chicago

  24. NIST Cloud Computing Standards Roadmap (2011) 1st ed. [ebook] The US Department of Commerce. Available at: http://www.nist.gov/itl/cloud/upload/NIST_SP-500-291_Version-2_2013_June18_FINAL.pdf

  25. Perlroth N (2014) Security needs evolve as computing leaves the office. [online] Bits Blog. Available at: http://bits.blogs.nytimes.com/2014/06/11/security-needs-evolve-as-computing-leaves-the-office/

  26. Rai A, Sharma S (2013) Privacy issues regarding personal data in cloud computing, 1st edn. International Journal of Advanced Research in Computer Science, New York, USA

    Google Scholar 

  27. Robinson N (2011) The cloud, 1st edn. Rand, Santa Monica

    Google Scholar 

  28. Searls D (2013) Bringing “Personal cloud” to market. Harvard Blog. https://blogs.law.harvard.edu/doc/2013/05/04/how-marketable-will-personal-cloud-be/

  29. Shetty S (2013) Gartner says cloud computing will become the bulk of new IT spend by 2016. Analysts examine cloud strategies and adoption at gartner symposium

    Google Scholar 

  30. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  31. Sugumaran M, Murugan BB, Kamalraj D (2014) An architecture for data security in cloud computing, computing and communication technologies (WCCCT), 2014 World Congress on, Delhi, India, 27 February 2014–1 March 2014, pp 252–255. doi:10.1109/WCCCT.2014.53

  32. Tomonari K, Yukio E (2010) Achieving a “Personal Cloud” environment, 1st edn. NEC Technical Journal

    Google Scholar 

  33. Varia J, Mathew S (2013) Overview of amazon web services. Available: http://media.amazonwebservices.com/AWS_Overview.pdf

  34. Walker K (2013) The Notorious Nine: cloud computing top threats in 2013. www.cloudsecurityalliance.org/topthreats. Cloud Security Alliance, London, UK

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kevin Curran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

McKelvey, N., Curran, K., Gordon, B., Devlin, E., Johnston, K. (2015). Cloud Computing and Security in the Future. In: Zhu, S., Hill, R., Trovati, M. (eds) Guide to Security Assurance for Cloud Computing. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-25988-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25988-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25986-4

  • Online ISBN: 978-3-319-25988-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics