Data security implementations in cloud computing: a critical review

Loading...
Thumbnail Image

Date

2018

Journal Title

Journal ISSN

Volume Title

Publisher

Information Technology Research Unit, Faculty of Information Technology, University of Moratuwa, Sri Lanka

Abstract

Cloud Computing has captured the market as the most promising computing paradigm, where users are allowed to use computing resources in a flexible and cost effective manner. Data storage is one of the services provided by cloud computing, where large amounts of data can be stored in public cloud servers away from the users’ premises. Storing data away from users’ premises in shared devices creates many security issues. Encryption techniques have been commonly employed for the obscuring information before storing in these shared devices. In this paper, the authors review the techniques used for hiding data from malicious intruders with respect to their strengths and weaknesses.

Description

Keywords

Data security, data life cycle, CIA triad, Encryption, RAID, Obfuscrypting, Anonimization

Citation

M. F. M. Firdhous and N. A. Hussien, "Data Security Implementations in Cloud Computing: A Critical Review," 2018 3rd International Conference on Information Technology Research (ICITR), 2018, pp. 1-5, doi: 10.1109/ICITR.2018.8736153.

Collections