Reference Hub1
Security- and Privacy-Aware Computing in Cloud With User Mobility: An Extensive Review

Security- and Privacy-Aware Computing in Cloud With User Mobility: An Extensive Review

Sayani Sen, Sathi Roy, Suparna Biswas, Chandreyee Chowdhury
Copyright: © 2020 |Pages: 20
ISBN13: 9781799810827|ISBN10: 1799810828|ISBN13 Softcover: 9781799810834|EISBN13: 9781799810841
DOI: 10.4018/978-1-7998-1082-7.ch001
Cite Chapter Cite Chapter

MLA

Sen, Sayani, et al. "Security- and Privacy-Aware Computing in Cloud With User Mobility: An Extensive Review." Modern Principles, Practices, and Algorithms for Cloud Security, edited by Brij B. Gupta, IGI Global, 2020, pp. 1-20. https://doi.org/10.4018/978-1-7998-1082-7.ch001

APA

Sen, S., Roy, S., Biswas, S., & Chowdhury, C. (2020). Security- and Privacy-Aware Computing in Cloud With User Mobility: An Extensive Review. In B. Gupta (Ed.), Modern Principles, Practices, and Algorithms for Cloud Security (pp. 1-20). IGI Global. https://doi.org/10.4018/978-1-7998-1082-7.ch001

Chicago

Sen, Sayani, et al. "Security- and Privacy-Aware Computing in Cloud With User Mobility: An Extensive Review." In Modern Principles, Practices, and Algorithms for Cloud Security, edited by Brij B. Gupta, 1-20. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-1082-7.ch001

Export Reference

Mendeley
Favorite

Abstract

Today's computational model has been undergoing a huge paradigm shift from personalized, local processing using local processing unit (LPU) to remote processing at cloud servers located globally. Advances in sensor-based smart applications such as smart home, smart health, smart transport, smart environment monitoring, etc. are generating huge data which needs to stored, pre-processed, analyzed using machine learning and deep learning techniques, which are resource-hungry, to generate results to be saved for future reference, and all these need to be done in real time, with scalability support satisfying user data privacy and security that may vary from application to application. In smart application like remote health monitoring and support, patient data needs utmost privacy besides confidentiality, integrity, and availability.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.