ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Data Security Policies in Cloud: A Survey

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 12)

Publication Date:

Authors : ; ;

Page : 1696-1700

Keywords : Encryption; Data deduplication; data self-destruction; role base access; reencryption;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In our modern day and age, many enterprises are embracing cloud computing. However, one of the major concerns regarding cloud computing has always been security. Encryption in cloud is still in a state of flux and infancy. Some vendors provide encryption, while others dont. There are different kinds of encryption schemes for securing data in the cloud, sometimes integrated within a system. Whenever a company decides it move its applications to the cloud, it considers several pros and cons before doing so. in this paper various cloud data security policies like Mediated certification, Role based access control, data deduplication and data self- destruction are presented which assist in protection of data in cloud.

Last modified: 2021-06-30 21:15:01