Show simple item record

dc.contributor.author Firdhous, MFM
dc.contributor.author Hussien, NA
dc.contributor.editor Wijesiriwardana, CP
dc.date.accessioned 2022-12-05T05:21:43Z
dc.date.available 2022-12-05T05:21:43Z
dc.date.issued 2018
dc.identifier.citation M. F. M. Firdhous and N. A. Hussien, "Data Security Implementations in Cloud Computing: A Critical Review," 2018 3rd International Conference on Information Technology Research (ICITR), 2018, pp. 1-5, doi: 10.1109/ICITR.2018.8736153. en_US
dc.identifier.uri http://dl.lib.uom.lk/handle/123/19627
dc.description.abstract Cloud Computing has captured the market as the most promising computing paradigm, where users are allowed to use computing resources in a flexible and cost effective manner. Data storage is one of the services provided by cloud computing, where large amounts of data can be stored in public cloud servers away from the users’ premises. Storing data away from users’ premises in shared devices creates many security issues. Encryption techniques have been commonly employed for the obscuring information before storing in these shared devices. In this paper, the authors review the techniques used for hiding data from malicious intruders with respect to their strengths and weaknesses. en_US
dc.language.iso en en_US
dc.publisher Information Technology Research Unit, Faculty of Information Technology, University of Moratuwa, Sri Lanka en_US
dc.relation.uri https://ieeexplore.ieee.org/document/8736153 en_US
dc.subject Data security en_US
dc.subject data life cycle en_US
dc.subject CIA triad en_US
dc.subject Encryption en_US
dc.subject RAID en_US
dc.subject Obfuscrypting en_US
dc.subject Anonimization en_US
dc.title Data security implementations in cloud computing: a critical review en_US
dc.type Conference-Full-text en_US
dc.identifier.faculty IT en_US
dc.identifier.department Information Technology Research Unit, Faculty of Information Technology, University of Moratuwa. en_US
dc.identifier.year 2018 en_US
dc.identifier.conference 3rd International Conference on Information Technology Research 2018 en_US
dc.identifier.proceeding Proceedings of the 3rdth International Conference in Information Technology Research 2018 en_US
dc.identifier.proceeding Proceedings of the 3rd International Conference in Information Technology Research 2018 en_US
dc.identifier.email firdhous@uom.lk en_US
dc.identifier.email naseerali@uowasit.edu.iq en_US
dc.identifier.doi 10.1109/ICITR.2018.8736153 en_US


Files in this item

This item appears in the following Collection(s)

  • ICITR - 2018 [34]
    International Conference on Information Technology Research (ICITR)

Show simple item record