Data Security Policies in Cloud: A Survey
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 12)Publication Date: 2014-12-05
Authors : Kasundra Punitkumar R.; Shikha J. Pachouly;
Page : 1696-1700
Keywords : Encryption; Data deduplication; data self-destruction; role base access; reencryption;
Abstract
In our modern day and age, many enterprises are embracing cloud computing. However, one of the major concerns regarding cloud computing has always been security. Encryption in cloud is still in a state of flux and infancy. Some vendors provide encryption, while others dont. There are different kinds of encryption schemes for securing data in the cloud, sometimes integrated within a system. Whenever a company decides it move its applications to the cloud, it considers several pros and cons before doing so. in this paper various cloud data security policies like Mediated certification, Role based access control, data deduplication and data self- destruction are presented which assist in protection of data in cloud.
Other Latest Articles
- Implementing Dynamic Bayesian Network for Soccer Videos Event Detection and Summarization
- Authentication of Colored Document Image with Data Repair Capability
- The Effect of Diacerein with and Without Diclofenac Sodium on Knee Pain Severity and Walking Time in Patients with Knee Osteoarthritis
- Optical Communication with Time Division Multiplexing (OTDM) and Hybrid WDM/OTDM PON
- Biodiversity of Nematodes in Chilli Crop Inranga Reddy District Of Telangana
Last modified: 2021-06-30 21:15:01