2018
DOI: 10.14569/ijacsa.2018.090229
|View full text |Cite
|
Sign up to set email alerts
|

The Proposed Model to Increase Security of Sensitive Data in Cloud Computing

Abstract: There is a complex problem regarding security of data in cloud, it becomes more critical when the data in question is highly sensitive. One of the main approaches to overcome this problem is the encryption data at rest, which comes with its own difficulties such as efficient key management, access permissions and similar. In this paper, we propose a new approach to security that is controlled by the IT Security Specialist (ITSS) of the company/organization. The approach is based on multiple strategies of file … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…-Encryption and Cryptography: such as studies [1,4,7,10,12,13]. These studies also mentioned various types of encryption and cryptography such as homomorphic, symmetric, asymmetric, multi-stage and hybrid encryption.…”
Section: Resultsmentioning
confidence: 99%
“…-Encryption and Cryptography: such as studies [1,4,7,10,12,13]. These studies also mentioned various types of encryption and cryptography such as homomorphic, symmetric, asymmetric, multi-stage and hybrid encryption.…”
Section: Resultsmentioning
confidence: 99%
“…Authors proved that DA‐Resch decreases the proportion of requests at work time, reduces the time for data transmission, and optimizes bandwidth consumption when compared to the Swift Client system in real‐world experiments utilizing the OpenStack storage (i.e., Swift). Hyseni and coworkers 24 devised a novel security method that is overseen by the company/organization's information technology specialist. This method is built on a number of file encryption, segmentation, and distribution mechanisms implemented by a number of storage providers.…”
Section: Related Workmentioning
confidence: 99%
“…To present an Amazon-defined identity, accessing Amazon cloud services like Amazon Simple Storage Service is essential; for instance, a Google account is required for using Google App Engine. Microsoft and other Windows Live Identity applications are provided by Microsoft, whereas BizTalk Services' identity service can be combined [10]. Since a specific identity provider is frequently secured with cloud computing platforms, developers lack absolute freedom.…”
Section: User Identity Managementmentioning
confidence: 99%