Cloud Data

Cloud Computing: Ethical And Social Issues

Cloud Computing: Ethical And Social Issues – Cloud computing security (sometimes simply referred to as “cloud security”) is an evolving subdomain of computer security, network security, and more broadly information security.

It refers to a broad set of policies, technologies, and controls implemented to protect data, applications, and associated cloud computing infrastructure.

Cloud Computing: Ethical And Social Issues

Cloud Computing: Ethical And Social Issues

In most cases, the provider must ensure that its infrastructure is secure and that its customers’ data and applications are protected, while the customer must ensure that the provider has taken appropriate security measures to protect its information through audits and management.

The Ethical Implications Of Artificial Intelligence: Navigating A Moral Compass In The Digital Age

Although cloud security issues can be grouped into any number of dimensions (Gartner lists seven while the Cloud Security Alliance identifies thirteen areas of concern), these dimensions are grouped into three general areas:

Numerous regulations relate to the storage and use of data, including the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), and the Sarbanes-Oxley Act, among others.

Cloud providers have business continuity and data recovery plans in place to ensure that service can be maintained in the event of a disaster or emergency and that lost data can be recovered.

In addition to the security and compliance issues listed above, cloud providers and their customers will negotiate terms on liability (specifying how, for example, incidents involving data loss or compromise will be resolved), intellectual property and purpose of service (when applications are ultimately return the customer.

Privacy And Security Issues In Cloud Computing: The Role Of Institutions And Institutional Evolution

Legal issues can also include record keeping requirements in the public sector, where many agencies are required by law to retain and make available electronic records upon request.

This may be mandated by law, or the law may require agencies to comply with the rules and practices established by a record keeping agency. Open Access Policy Institutional Open Access Program Special Issues Guidelines Editorial Process Research Ethics and Publication of Articles Processing Fees Awards Testimonials

All articles published by are immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission as long as the original article is clearly cited. For more information, see https:///openaccess.

Cloud Computing: Ethical And Social Issues

Featured articles represent the most advanced research with significant potential for high impact in the field. An article must be a substantial original article that involves various techniques or approaches, provides a perspective for future research directions, and describes possible research applications.

How Ethics Combine With Big Data: A Bibliometric Analysis

Featured articles are submitted by invitation or individual recommendation from scientific editors and must receive positive feedback from reviewers.

Editor’s Choice articles are based on recommendations from scientific journal editors around the world. The editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers or important in the respective research area. The aim is to provide a snapshot of some of the most interesting work published in the different research areas of the journal.

By Abeer Iftikhar Tahirkheli Abeer Iftikhar Tahirkheli Scilit Preprints.org Google Scholar View Publications 1, Muhammad Shiraz Muhammad Shiraz Scilit Preprints.org Google Scholar View Publications 2, Bashir Hayat Bashir Hayat Scilit Preprints.org Google Scholar View Publications 3, Id. Muhammad Scilit Muhammad Preprints.org Google Scholar View Publications 4, Ahthasham Sajid Ahthasham Sajid Scilit Preprints.org Google Scholar View Publications 5, Rahat Ullah Rahat Ullah Scilit Preprints.org Google Scholar View Publications 6, Nasir Ayub Nasir Ayub Scilit Google Scholar. View Publications 2 and Ki-Il Kim Ki-Il Kim Scilit Preprints.org Google Scholar View Publications 7, *

Department of Computer Science, Faculty of ICT, Balochistan University of Information Technology Engineering and Management Sciences Quetta, Quetta 87300, Pakistan

A Crisis Of Ethics In Technology Innovation

Submission received: 7 June 2021 / Revised: 12 July 2021 / Accepted: 16 July 2021 / Published: 28 July 2021

(This article belongs to the special issue Recent Advances in Internet of Things and Emerging Social Internet of Things: Vision, Challenges and Trends)

Cloud computing (CC) is a promising technology due to its widespread features such as online storage, high scalability and seamless accessibility, which plays an important role in reducing capital and labor costs, which attracts organizations to run their business. and financial activities through the cloud. While CC is a major innovation in accessible computing, it also has some drawbacks. With the increase in cloud usage, security concerns are commensurate with the increase. To address this, much work has been done in this domain, while research work is still lacking, considering the growing limited applications provided by the Internet of Things (IoT) and smart city networks. In this survey, we provide a comprehensive security analysis of CC-enabled IoT and present the state of the art in the research area. Finally, future research work and possible areas of implementation and consideration are presented to discuss open questions.

Cloud Computing: Ethical And Social Issues

With the introduction of IoT, every object is connected to the Internet to provide various types of services such as resource management, scalability, elasticity, energy management, data storage, etc. CC concepts have been proposed to provide these services. CC offers many facilities such as remote data access, cost reduction, bandwidth, storage and ease of access [1]. Their services can work on distributed networks without any interface, as shown in Figure 1. Cloud service providers (CSPs) need their software and hardware, while users need to install CC-based web applications [2] . Clouds offer us interoperability and shared control managed by different authorities, so trust is important in sharing sensitive data. Clouds have many types, such as public, private, community, and hybrid [3, 4].

Data Privacy, Security Top Challenges For Cloud Implementation

Edge computing is an emerging technology to bring computing and storage resources closer to the data source, increase response time and save limited bandwidth in response to the rapid growth of the IoT and increasing demands for advanced service and application-level applications Security, privacy and data protection however, in edge nodes in the computing world, the important challenges are due to the limited resources offered and the large sensitive data of users on edge nodes [5, 6, 7]. Traditional CC, which is used to support general computing systems, cannot meet the needs of IoT and mobile services due to problems including location unawareness, bandwidth limitations, high operating costs, lack of real-time services, and data privacy issues [8]. ]. These CC limitations provide opportunities for edge computing, where this technology is globally conceptualized to meet the runtime as well as the growing real-time demands of IoT and mobile devices or nodes [ 9 , 10 , 11 ].

Smart city networks are designed to handle various areas of life, including the transportation, electricity, health, banking, and administration sectors [ 12 , 13 ]. There are several types of intelligent systems implemented in smart cities, such as IoT, smart grids, wireless sensor networks (WSNs), and intelligent transportation systems (ITS) [ 14 , 15 , 16 , 17 ]. All data communication in these edge-based smart systems is based on secure and reliable communication between all devices in smart cities [ 18 , 19 , 20 , 21 ]. There is a growing need for high-level protection strategies in edge-based smart city networks due to the large number of involved users, complex systems, and sensitive data [ 18 , 22 ]. One of the important challenges to ensure secure and consistent data communication over these networks is security [ 23 , 24 , 25 , 26 ]. In general, a single preventive measure will not be able to manage all security risks [ 27 , 28 , 29 ]. This forces the protection of valuable data by identifying threats in real time, enabling cost-effective detection and treatment [ 30 , 31 ]. Furthermore, due to the vulnerable nature of high-risk environments, some threats and countermeasures/precautionary measures are difficult to assess [32].

Many companies are moving to CC. When data owners submit their data to the CSP, they provide the right to use the data. CSP may misuse the data. Data integrity is essential when you have data online, such as in a cloud, server or fog, that is specifically related to your business, family or health, and it becomes very important to protect it. In CC, the main challenges are privacy, protection, integrity and non-repudiation, while in smart city networks, security-based approaches are needed to increase the degree of trust of nodes deployed in smart cities directly based on their past experiences. or indirectly, to record and serialize all information, especially sensitive business-oriented data for decision-making.

Existing security-based solutions, including authentication and cryptography-based solutions, provide security solutions to a certain extent and cannot handle various insider attacks. Mainly in academia, more emphasis is placed on the implementation of security frameworks in edge-based smart cities [33, 34]. The basic concept behind edge computing networks is to use a hierarchy of edge network-based servers with increased computing capabilities to handle heterogeneous and mobile computing tasks that are typically offloaded to low-end edge devices (IoT and mobile devices). Edge computing can support evolving smart city applications by providing low-cost, bandwidth-sufficient, real-time, privacy-aware, and location-aware services [ 35 , 36 ]. Edge computing has grown rapidly in recent years due to its advantages over CC. According to Statista’s most recent survey, the demand for edge computing in the United States

Main Ethical Concerns Of Service Robots And Human Interaction

Issues in cloud computing, cloud computing and security issues, social and ethical issues in computing, security issues cloud computing, legal issues cloud computing, cloud computing ethical issues, social media ethical issues, cloud computing privacy issues, cloud computing issues, cloud computing and privacy issues, social issues of cloud computing, ethical issues and social media

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button