Current and Future Perspectives on Data Privacy in Cloud Networking
Keywords:
Data privacy, Cloud networking, GDPR, CCPA, Encryption, Access controlsAbstract
Data privacy in cloud networking is increasingly vital as organizations migrate sensitive information to cloud environments. This paper examines current trends and future directions in data privacy policies and technical measures within cloud networking. It explores the evolution of regulatory frameworks such as GDPR and CCPA and their impact on cloud service providers and users. Technical measures such as encryption, access controls, and data anonymization are analyzed for their effectiveness in protecting data confidentiality and integrity. The paper discusses challenges such as cross-border data transfers and compliance with varying international standards. Future directions include advancements in homomorphic encryption, differential privacy, and AI-driven privacy-enhancing technologies. By addressing these issues, organizations can enhance data privacy in cloud networking while ensuring compliance with regulatory requirements and maintaining user trust.
References
[1] B. Desai and K. Patil, "Demystifying the complexity of multi-cloud networking," Asian American Research Letters Journal, vol. 1, no. 4, 2024.
[2] A. A. Alli and M. M. Alam, "The fog cloud of things: A survey on concepts, architecture, standards, tools, and applications," Internet of Things, vol. 9, p. 100177, 2020.
[3] B. Desai and K. Patil, "Secure and Scalable Multi-Modal Vehicle Systems: A Cloud-Based Framework for Real-Time LLM-Driven Interactions," Innovative Computer Sciences Journal, vol. 9, no. 1, pp. 1− 11-1− 11, 2023.
[4] R. Kumar and N. Agrawal, "Analysis of multi-dimensional Industrial IoT (IIoT) data in Edge-Fog-Cloud based architectural frameworks: A survey on current state and research challenges," Journal of Industrial Information Integration, p. 100504, 2023.
[5] M. Aldossary, "Multi-layer fog-cloud architecture for optimizing the placement of IoT applications in smart cities," Computers, Materials & Continua, vol. 75, no. 1, pp. 633-649, 2023.
[6] K. Patil and B. Desai, "Leveraging LLM for Zero-Day Exploit Detection in Cloud Networks," Asian American Research Letters Journal, vol. 1, no. 4, 2024.
[7] K. Patil and B. Desai, "A Trifecta for Low-Latency Real-Time Analytics: Optimizing Cloud-Based Applications with Edge-Fog-Cloud Integration Architecture," MZ Computing Journal, vol. 4, no. 1, pp. 1− 12-1− 12, 2023.
[8] A. Khadidos, A. Subbalakshmi, A. Khadidos, A. Alsobhi, S. M. Yaseen, and O. M. Mirza, "Wireless communication based cloud network architecture using AI assisted with IoT for FinTech application," Optik, vol. 269, p. 169872, 2022.
[9] K. Patil and B. Desai, "From Remote Outback to Urban Jungle: Achieving Universal 6G Connectivity through Hybrid Terrestrial-Aerial-Satellite Networks," Advances in Computer Sciences, vol. 6, no. 1, pp. 1− 13-1− 13, 2023.
[10] B. Desai and K. Patel, "Reinforcement Learning-Based Load Balancing with Large Language Models and Edge Intelligence for Dynamic Cloud Environments," Journal of Innovative Technologies, vol. 6, no. 1, pp. 1− 13-1− 13, 2023.
[11] A. Gui, A. B. D. Putra, A. G. Sienarto, H. Andriawan, I. G. M. Karmawan, and A. Permatasari, "Factors Influencing Security, Trust and Customer Continuance Usage Intention of Cloud based Electronic Payment System in Indonesia," in 2021 8th International Conference on Information Technology, Computer and Electrical Engineering (ICITACEE), 2021: IEEE, pp. 137-142.
[12] F. Firouzi, B. Farahani, and A. Marinšek, "The convergence and interplay of edge, fog, and cloud in the AI-driven Internet of Things (IoT)," Information Systems, vol. 107, p. 101840, 2022.
[13] P. Kochovski, R. Sakellariou, M. Bajec, P. Drobintsev, and V. Stankovski, "An architecture and stochastic method for database container placement in the edge-fog-cloud continuum," in 2019 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2019: IEEE, pp. 396-405.
[14] N. Mazher and I. Ashraf, "A Systematic Mapping Study on Cloud Computing Security," International Journal of Computer Applications, vol. 89, no. 16, pp. 6-9, 2014.