Author:
Khan Mohammad Zunnun,Shoaib Mohd,Husain Mohd Shahid,Ul Nisa Khair,Quasim Mohammad. Tabrez
Abstract
AbstractCloud computing is a new paradigm in this new cyber era. Nowadays, most organizations are showing more reliability in this environment. The increasing reliability of the Cloud also makes it vulnerable. As vulnerability increases, there will be a greater need for privacy in terms of data, and utilizing secure services is highly recommended. So, data on the Cloud must have some privacy mechanisms to ensure personal and organizational privacy. So, for this, we must have an authentic way to increase the trust and reliability of the organization and individuals The authors have tried to create a way to rank things that uses the Analytical Hieratical Process (AHP) and the Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS). Based on the result and comparison, produce some hidden advantages named cost, benefit, risk and opportunity-based outcomes of the result.In this paper, we are developing a cloud data privacy model; for this, we have done an intensive literature review by including Privacy factors such as Access Control, Authentication, Authorization, Trustworthiness, Confidentiality, Integrity, and Availability. Based on that review, we have chosen a few parameters that affect cloud data privacy in all the phases of the data life cycle. Most of the already available methods must be revised per the industry’s current trends. Here, we will use Analytical Hieratical Process and Technique for Order Preference by Similarity to the Ideal Solution method to prove that our claim is better than other cloud data privacy models. In this paper, the author has selected the weights of the individual cloud data privacy criteria and further calculated the rank of individual data privacy criteria using the AHP method and subsequently utilized the final weights as input of the TOPSIS method to rank the cloud data privacy criteria.
Publisher
Springer Science and Business Media LLC
Reference40 articles.
1. Golden BL, Wang Q (1990) An alternative measure of consistency. In: Golden BL, Wasil A, Harker PT (eds) Analytic hierarchy process: applications and studies. Springer Verlag, New-York, pp 68–81
2. Jalaliyoon N, Bakar NA, Taherdoost H (2012) Accomplishment of critical success factor in organization; using analytic hierarchy process. Int J Acad Res Manag 1(1):1–9. Helvetic Editions Ltd
3. Van Blarkom GW, Borking JJ (2003) Handbook of privacy and privacy-enhancing technologies - the case of intelligent software agents. Retrieved from e-Europe: ftp://ftp.cenorm.be/PUBLIC/CWAs/e-Europe/DPP/CWA15263-00-2005-Apr.pdf
4. Federal Trade Commission (2010) Protecting consumer privacy in an era of rapid change: a proposed framework for businesses and policymakers. Retrieved from www.ftc.gov/os/2010/12/101201privacyreport.pdf
5. Quasim MT, Nisa KU, Khan MZ et al (2023) An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities. J Cloud Comp 12:158. https://doi.org/10.1186/s13677-023-00525-4
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献