2015 International Conference on Green Computing and Internet of Things (ICGCIoT) 2015
DOI: 10.1109/icgciot.2015.7380702
|View full text |Cite
|
Sign up to set email alerts
|

Cloud computing data breaches a socio-technical review of literature

Abstract: As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 51 publications
0
5
0
Order By: Relevance
“…AES is a symmetric algorithm which includes a series of substitution and permutation steps to create the block for encryption which is encrypted block. Firstly, DES implementation was made a great enrichment to data security, but one could say that for the AES algorithm has been better than the DES in terms of random key generation [37]. AES was also taken as the random bit key generated based on time so it shows more secure for the encryption to the data which are received by the unauthorized user.…”
Section: Prevents Unauthorized Use Of Datamentioning
confidence: 99%
“…AES is a symmetric algorithm which includes a series of substitution and permutation steps to create the block for encryption which is encrypted block. Firstly, DES implementation was made a great enrichment to data security, but one could say that for the AES algorithm has been better than the DES in terms of random key generation [37]. AES was also taken as the random bit key generated based on time so it shows more secure for the encryption to the data which are received by the unauthorized user.…”
Section: Prevents Unauthorized Use Of Datamentioning
confidence: 99%
“…Mitigating data leakage from insider threats is a difficult challenge [2], [3]. Data leakage can occur in many forms and in any place [4], [5]. In survey of United States in 2014, Cybercrime emphasize on the seriousness of attacks caused by insiders of the companies.…”
Section: Introductionmentioning
confidence: 99%
“…Safety measures for Data-in-Use: Local agents and host machines regularly check sensitive data such as data copied from one location and pasted into another location, data from print screen, unauthorized data transmission and copying data to a USB/CD/DVD [5].…”
Section: Figure 3 Dlps Activitiesmentioning
confidence: 99%
“…Safety measures for Data-in-Use: Local agents and host machines regularly check sensitive data such as data copied from one location and pasted into another location, data from the print screen, unauthorized data transmission and copying data to a USB/CD/DVD [21].…”
Section: Safety Measures For Data-at-restmentioning
confidence: 99%
“…Mitigating data leakage from insider threats is a difficult challenge [18], [19]. Data leakage can occur in many forms and in any place [20], [21]. In the survey of United States in 2014, Cybercrime emphasizes on the seriousness of attacks caused by insiders of the companies.…”
Section: Introductionmentioning
confidence: 99%