{"id":2089,"date":"2019-09-17T11:52:28","date_gmt":"2019-09-17T11:52:28","guid":{"rendered":"http:\/\/tutorsindia.com\/academy\/?p=2089"},"modified":"2022-12-15T10:33:43","modified_gmt":"2022-12-15T10:33:43","slug":"security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model","status":"publish","type":"post","link":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/","title":{"rendered":"Security And Privacy Issues Over The Cloud Environment:  Tips For Developing Secure Cloud Model"},"content":{"rendered":"\n<h4><a style=\"color: #7694cb;\" href=\"#\" data-wplink-edit=\"true\">Engineering  &amp; Technology<\/a><\/h4>\n\n\n\n<p><h2><strong>Security And Privacy Issues Over The Cloud Environment:  Tips For Developing Secure Cloud Model\n  2019<\/strong><\/h2>Sep 17, 2019<\/p><\/br>\n\n\n\n<h3>RESEARCH REPORT<\/h3>\n<div class=\"pdffile\">\n<p><a href=\"https:\/\/tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/Security-and-privacy-issues-over-the-cloud-environment.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><button>View Full Report <i class=\"fa fa-eye 3x\"><\/i><\/button><\/a><\/p>\n<\/div>\n\n\n\n<h1><strong>In Brief:<\/strong><\/h1>\n\n\n\n<h2>General background<\/h2>\n\n\n\n<hr class=\"wp-block-separator\" style=\"margin-top: -8px;max-width: 100%;height:2px;background: #87cefa\">\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;Over the past decades, there is a rapid growth of data generated in the form of unstructured, semi-structured and unstructured [1] which is from multiple resources. For instances, various organization, government sector, social network website and medical applications that serve around millions of web page views per day, but the storage and maintenance of these huge data becomes complex and cannot be handled by traditional data management systems [2].  Hence there is a need of new frameworks, platforms and novel techniques for data safety, data management, privacy maintenance, and data analytics [3]. Among these, there is a special focus required for privacy and security of our data [4] [5] [6]. Apart from the security and privacy issue, the following questions are significant issues:<\/p>\n\n\n\n<p style=\"margin-left: 40%; \"> <b>&#8220;How to make good use of data,<br>\nHow to maintain the user privacy,<br>\nHow to guarantee data availability <br>\nWhile ensuring the data security&#8221;<\/b><\/p><br>\n\n\n\n<i><b>See also: <b><u><a href=\"https:\/\/tutorsindia.com\/academy\/recent-trends\/engineering-and-techology\/secure-access-control-framework-for-fully-fledged-network-security-control-how-machine-learning-algorithms-helps-to-improve-security\/\">Secure Access Control Framework for Fully Fledged Network Security Control<\/a><\/u><i><br\/><br\/>\n\n\n\n<i><b>See also: <b><u><a href=https:\/\/tutorsindia.com\/academy\/recent-trends\/engineering-and-techology\/tips-for-developing-secure-and-flexible-management-policy-for-multiple-users-over-the-cloud\/\">Tips for developing secure and flexible management policy<\/a><\/u><i><br\/><br\/>\n\n\n\n<h2>Security and privacy concern<\/h2>\n\n\n\n<hr class=\"wp-block-separator\" style=\"margin-top: -8px;max-width: 100%;height:2px;background: #87cefa\">\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;From an academic and industrial point of view, the encryption process will be an effective solution toward solving the privacy and security issues. Also, it protects the sensitive information which is outsourced as long as the data has been encrypted through data owner before upload to the trusted cloud system. But, till date, there is a lack of effective approach to offering secure access on cloud services and complex due to the open nature of the wireless communication medium <b>(Sundareswaran et al., 2012; Peng et al., 2012; Qin et al., 2016; Jegadeesan et al., 2019)<\/b>. <\/p><br>\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;The primary security requirements includes data transparency, availability, authentication, integrity confidentiality, and audits as specified [10]. Similarly, the privacy requirements are like malicious insiders, insecure APIs, shared technology issues, account hijacking and so on [11]. <\/p>\n\n\n\n<div class=\"wp-block-image zoom\"><figure class=\"aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" width=\"476\" height=\"460\" src=\"https:\/\/tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tree.png\" alt=\"\" class=\"wp-image-2108\" srcset=\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tree.png 476w, https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tree-300x290.png 300w\" sizes=\"(max-width: 476px) 100vw, 476px\" \/><figcaption><em> Figure 1: Tree structure for security and privacy issues over the<\/em><br><em> cloud environment <\/em>[10] <\/figcaption><\/figure><\/div>\n\n\n\n<p>There is a need of following recommendations: <br\/>\n<ul>\n<li type=\"square\">Secure access control framework for full-fledged network security control.<\/li>\n<li type=\"square\">Flexible management policy which should considering a large number of users.<\/li>\n<li type=\"square\">Effective machine learning technique to handle cloud resources and load balancing task for both private and public cloud.<\/li>\n<li type=\"square\">Effective scheduling technique to handle multiple workflow with considering multiple priorities at different times in cloud.<\/li>\n<li type=\"square\">Suitable machine learning technique to find and differentiating pattern of data from multiple sources.<\/li>\n<li type=\"square\">Solve and optimize the security and decision-making issues via artificial intelligence.<\/li>\n<li type=\"square\">Implement effective Soft computing technique to detect network attacks where we can solve the hacking issues.<\/li>\n<li type=\"square\">Implement the effective web mining technique to discover the knowledge in web-based environments.<\/li> <\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a href=\"https:\/\/www.tutorsindia.com\/our-services\/masters-dissertation-writing-services\/dissertation-topic\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"728\" height=\"90\" src=\"https:\/\/tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tutors-india.jpg\" alt=\"\" class=\"wp-image-2195\" srcset=\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tutors-india.jpg 728w, https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tutors-india-600x74.jpg 600w, https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/tutors-india-300x37.jpg 300w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/a><\/figure><\/div>\n\n\n\n<h2>Summary<\/h2>\n\n\n\n<hr class=\"wp-block-separator\" style=\"margin-top: -8px;max-width: 100%;height:2px;background: #87cefa\">\n\n\n\n<p style=\"text-align:justify\">&nbsp;&nbsp;&nbsp;&nbsp;Till date, there is a lack of effective approach to offering secure access cloud model and services. This is due to the open nature of the data from multiple sources. Hence I have suggested the above recommendations for full-fledged network secure model. It can be concluded that the different kinds of management system, the Cloud service providers (CSPs) have more responsibility in cloud environment. Also, the sensitive data requires security and privacy concern from both cloud users and CSPs. <\/p>\n\n\n\n<figure class=\"wp-block-video aligncenter\"><video height=\"720\" style=\"aspect-ratio: 1280 \/ 720;\" width=\"1280\" autoplay controls muted src=\"https:\/\/tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/Security-and-privacy-issues-over-the-cloud-environment.mp4\"><\/video><\/figure>\n\n\n\n        <div class=\"rmwr-wrapper\" \n             data-id=\"rmwr-69e77205d0a88\"\n             data-mode=\"normal\"\n             data-animation=\"fade\"\n             data-duration=\"300\"\n             data-smooth-scroll=\"true\"\n             data-scroll-offset=\"0\">\n            <button \n                type=\"button\"\n                class=\"read-link\" \n                id=\"readlinkrmwr-69e77205d0a88\"\n                data-open-text=\"References\"\n                data-close-text=\"References\"\n                aria-expanded=\"false\"\n                aria-controls=\"readrmwr-69e77205d0a88\"\n                aria-label=\"References\"\n            >\n                <span class=\"rmwr-text\">References<\/span>\n            <\/button>\n            <div \n                class=\"read_div\" \n                id=\"readrmwr-69e77205d0a88\"\n                aria-hidden=\"true\"\n                data-animation=\"fade\"\n                data-duration=\"300\"\n                style=\"display: none;\"\n            >\n                 \n\n<p style=\"text-align:justify\">\n[1]\tD. Gil and I.-Y. Song, \u201cModeling and Management of Big Data: Challenges and opportunities,\u201d<i> Futur. Gener. Comput. Syst., <\/i>vol. 63, pp. 96\u201399, Oct. 2016.<br><br>\n[2]\tC. L. Philip Chen and C.-Y. Zhang, \u201cData-intensive applications, challenges, techniques and technologies: A survey on Big Data,\u201d <i>Inf. Sci. (Ny)., <\/i>vol. 275, pp. 314\u2013347, Aug. 2014.<br><br>\n[3]\tQ. Liu, A. Srinivasan, J. Hu, and G. Wang, \u201cPreface: Security and privacy in big data clouds,\u201d <i>Futur. Gener. Comput. Syst.,<\/i> vol. 72, pp. 206\u2013207, Jul. 2017.<br><br>\n[4]\tV. Chang and M. Ramachandran, \u201cTowards Achieving Data Security with the Cloud Computing Adoption Framework,\u201d<i> IEEE Trans. Serv. Comput.,<\/i> vol. 9, no. 1, pp. 138\u2013151, Jan. 2016.<br><br>\n[5]\tV. Chang, Y.-H. Kuo, and M. Ramachandran, \u201cCloud computing adoption framework: A security framework for business clouds,\u201d<i> Futur. Gener. Comput. Syst., <\/i>vol. 57, pp. 24\u201341, Apr. 2016.<br><br>\n[6]\tQ. Zhang, G. Wang, and Q. Liu, \u201cEnabling Cooperative Privacy-preserving Personalized search in cloud environments,\u201d<i> Inf. Sci. (Ny)., <\/i>vol. 480, pp. 1\u201313, Apr. 2019.<br><br>\n[7]\tS. Sundareswaran, A. Squicciarini, and D. Lin, \u201cEnsuring Distributed Accountability for Data Sharing in the Cloud,\u201d<i> IEEE Trans. Dependable Secur. Comput.,<\/i> vol. 9, no. 4, pp. 556\u2013568, Jul. 2012.<br><br>\n[8]\tZ. Qin, H. Xiong, S. Wu, and J. Batamuliza, \u201cA Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing,\u201d <i>IEEE Trans. Serv. Comput., <\/i>pp. 1\u20131, 2016.<br><br>\n[9]\tS. Jegadeesan et al., \u201cAn efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications,\u201d<i> Sustain. Cities Soc.,<\/i> vol. 49, p. 101522, Aug. 2019.<br><br>\n[10]\tN. Subramanian and A. Jeyaraj, \u201cRecent security challenges in cloud computing,\u201d <i>Comput. Electr. Eng., <\/i>vol. 71, pp. 28\u201342, Oct. 2018.<br><br>\n[11]\tN. A. Azeez and C. Van der Vyver, \u201cSecurity and privacy issues in e-health cloud-based system: A comprehensive content analysis,\u201d <i>Egypt. Informatics J., <\/i>vol. 20, no. 2, pp. 97\u2013108, Jul. 2019.<br><br>\n<\/p><br><br>\n\n             <\/div>\n        <\/div>\n        \n\n\n\n<hr class=\"wp-block-separator\"\/>\n","protected":false},"excerpt":{"rendered":"<p>Engineering &amp; Technology Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model 2019 Sep 17, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2875,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[147],"tags":[],"class_list":["post-2089","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering-and-techology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model - Recent-Research Trends<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model - Recent-Research Trends\" \/>\n<meta property=\"og:description\" content=\"Engineering &amp; Technology Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model 2019 Sep 17, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/\" \/>\n<meta property=\"og:site_name\" content=\"Recent-Research Trends\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-17T11:52:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-15T10:33:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"330\" \/>\n\t<meta property=\"og:image:height\" content=\"186\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tutors India\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tutors India\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/\"},\"author\":{\"name\":\"Tutors India\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8\"},\"headline\":\"Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model\",\"datePublished\":\"2019-09-17T11:52:28+00:00\",\"dateModified\":\"2022-12-15T10:33:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/\"},\"wordCount\":199,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png\",\"articleSection\":[\"Engineering And Technology\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/\",\"url\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/\",\"name\":\"Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model - Recent-Research Trends\",\"isPartOf\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png\",\"datePublished\":\"2019-09-17T11:52:28+00:00\",\"dateModified\":\"2022-12-15T10:33:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#primaryimage\",\"url\":\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png\",\"contentUrl\":\"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png\",\"width\":330,\"height\":186},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tutorsindia.com\/academy\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#website\",\"url\":\"https:\/\/www.tutorsindia.com\/academy\/\",\"name\":\"Recent-Research Trends\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tutorsindia.com\/academy\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8\",\"name\":\"Tutors India\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g\",\"caption\":\"Tutors India\"},\"url\":\"https:\/\/www.tutorsindia.com\/academy\/author\/tutors-india\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model - Recent-Research Trends","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/","og_locale":"en_GB","og_type":"article","og_title":"Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model - Recent-Research Trends","og_description":"Engineering &amp; Technology Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model 2019 Sep 17, [&hellip;]","og_url":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/","og_site_name":"Recent-Research Trends","article_published_time":"2019-09-17T11:52:28+00:00","article_modified_time":"2022-12-15T10:33:43+00:00","og_image":[{"width":330,"height":186,"url":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png","type":"image\/png"}],"author":"Tutors India","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tutors India","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#article","isPartOf":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/"},"author":{"name":"Tutors India","@id":"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8"},"headline":"Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model","datePublished":"2019-09-17T11:52:28+00:00","dateModified":"2022-12-15T10:33:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/"},"wordCount":199,"commentCount":0,"image":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png","articleSection":["Engineering And Technology"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/","url":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/","name":"Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model - Recent-Research Trends","isPartOf":{"@id":"https:\/\/www.tutorsindia.com\/academy\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#primaryimage"},"image":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png","datePublished":"2019-09-17T11:52:28+00:00","dateModified":"2022-12-15T10:33:43+00:00","author":{"@id":"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8"},"breadcrumb":{"@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#primaryimage","url":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png","contentUrl":"https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png","width":330,"height":186},{"@type":"BreadcrumbList","@id":"https:\/\/www.tutorsindia.com\/academy\/engineering-and-techology\/security-and-privacy-issues-over-the-cloud-environment-tips-for-developing-secure-cloud-model\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tutorsindia.com\/academy\/"},{"@type":"ListItem","position":2,"name":"Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model"}]},{"@type":"WebSite","@id":"https:\/\/www.tutorsindia.com\/academy\/#website","url":"https:\/\/www.tutorsindia.com\/academy\/","name":"Recent-Research Trends","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tutorsindia.com\/academy\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.tutorsindia.com\/academy\/#\/schema\/person\/549da3f9d0abf7ce135b1e6d28d860d8","name":"Tutors India","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4272ff0e8cf9cb2a9372c3288bc234e66ea1a3f50b010da465e24824e705bd5c?s=96&d=mm&r=g","caption":"Tutors India"},"url":"https:\/\/www.tutorsindia.com\/academy\/author\/tutors-india\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png",330,186,false],"landscape":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png",330,186,false],"portraits":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png",330,186,false],"thumbnail":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2-150x150.png",150,150,true],"medium":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2-300x169.png",300,169,true],"large":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png",330,186,false],"1536x1536":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png",330,186,false],"2048x2048":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png",330,186,false],"rdtheme-size1":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png",330,186,false],"rdtheme-size2":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png",330,186,false],"rdtheme-size3":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png",330,186,false],"rdtheme-size6":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2.png",330,186,false],"rdtheme-size8":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2-92x92.png",92,92,true],"rdtheme-size5":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2-150x100.png",150,100,true],"rdtheme-size4":["https:\/\/www.tutorsindia.com\/academy\/wp-content\/uploads\/2019\/09\/security-and-privacy-issue-2-80x62.png",80,62,true]},"rttpg_author":{"display_name":"Tutors India","author_link":"https:\/\/www.tutorsindia.com\/academy\/author\/tutors-india\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/www.tutorsindia.com\/academy\/category\/engineering-and-techology\/\" rel=\"category tag\">Engineering And Technology<\/a>","rttpg_excerpt":"Engineering &amp; Technology Security And Privacy Issues Over The Cloud Environment: Tips For Developing Secure Cloud Model 2019 Sep 17, [&hellip;]","_links":{"self":[{"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/posts\/2089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/comments?post=2089"}],"version-history":[{"count":0,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/posts\/2089\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/media\/2875"}],"wp:attachment":[{"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/media?parent=2089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/categories?post=2089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tutorsindia.com\/academy\/wp-json\/wp\/v2\/tags?post=2089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}