2015
DOI: 10.5815/ijmecs.2015.08.05
|View full text |Cite
|
Sign up to set email alerts
|

Data Protection Techniques for Building Trust in Cloud Computing

Abstract: Abstract-Cloud computing has played much important role in comparison to other fields of IT, in providing Data storage, Data security, Quality of Services (QoS) etc. In the last few years, it had emerged and evolved so quickly due to its number of facilities and advantages to the organizations and end users. Many data security factors have also increased due to this fast evolution of cloud in the IT industry. Therefore several security models and trust establishing techniques have been deployed and are been in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…Whenever a user has established the connection to the cloud, the user will need to login and access the cloud resources in order to drive forward the idea of hosting applications, websites or even doing online sales securely through a secure login tunnel. This has to be fully done by successful authentication and authorization to avoid loss of data and identity being manipulated which could lead to unwanted access to the cloud system [5].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Whenever a user has established the connection to the cloud, the user will need to login and access the cloud resources in order to drive forward the idea of hosting applications, websites or even doing online sales securely through a secure login tunnel. This has to be fully done by successful authentication and authorization to avoid loss of data and identity being manipulated which could lead to unwanted access to the cloud system [5].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Then the original information is obtained by the authorized person who decodes the encrypted message in an appropriate manner. And this procedure is termed as decryption [12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…Cloud computing [1] is a potent Internet-based service, which offers a new technique to provide huge amount of shared resources offered by several cloud service providers (CSPs). There are t wo main advantages for adopting a cloud solution [2], which have been discussed in the literature.…”
Section: Introductionmentioning
confidence: 99%