Data security implementations in cloud computing: a critical review
Loading...
Date
2018
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Information Technology Research Unit, Faculty of Information Technology, University of Moratuwa, Sri Lanka
Abstract
Cloud Computing has captured the market as the
most promising computing paradigm, where users are allowed to
use computing resources in a flexible and cost effective manner.
Data storage is one of the services provided by cloud computing,
where large amounts of data can be stored in public cloud
servers away from the users’ premises. Storing data away from
users’ premises in shared devices creates many security issues.
Encryption techniques have been commonly employed for the
obscuring information before storing in these shared devices. In
this paper, the authors review the techniques used for hiding
data from malicious intruders with respect to their strengths
and weaknesses.
Description
Keywords
Data security, data life cycle, CIA triad, Encryption, RAID, Obfuscrypting, Anonimization
Citation
M. F. M. Firdhous and N. A. Hussien, "Data Security Implementations in Cloud Computing: A Critical Review," 2018 3rd International Conference on Information Technology Research (ICITR), 2018, pp. 1-5, doi: 10.1109/ICITR.2018.8736153.