Security approach for Protecting Data in Cloud Computing
Kavana M D
, Asha Rani M , Shruthi B M
access control, authentication, authorization, cloud computing, confidentiality, data protection.
Cloud computing has a lot of security issues that are gaining great attention nowadays, including the data protection, network security, virtualization security, application integrity, and identity management. Data protection is one of the most important security issues, because organizations won’t transfer its data to remote machines if there is no guaranteed data protection from the cloud service providers. Many techniques are suggested for data protection in cloud computing, but there are still a lot of challenges in this subject. The most popular security techniques include SSL (Secure Socket Layer) Encryption, Intrusion Detection System; Multi Tenancy based Access Control, etc. Goal of this paper is to analyze and evaluate the most important security techniques for data protection in cloud computing. Furthermore, security techniques for data protection will be recommended in order to have improved security in cloud computing.
"Security approach for Protecting Data in Cloud Computing", IJSDR - International Journal of Scientific Development and Research (www.IJSDR.org), ISSN:2455-2631, Vol.2, Issue 5, page no.84 - 87, May-2017, Available :https://ijsdr.org/papers/IJSDR1705016.pdf
Volume 2
Issue 5,
May-2017
Pages : 84 - 87
Paper Reg. ID: IJSDR_170349
Published Paper Id: IJSDR1705016
Downloads: 000347030
Research Area: Engineering
Country: Mysuru, Karnataka, India
ISSN: 2455-2631 | IMPACT FACTOR: 9.15 Calculated By Google Scholar | ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 9.15 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Publisher: IJSDR(IJ Publication) Janvi Wave