Data security implementations in cloud computing: a critical review

dc.contributor.authorFirdhous, MFM
dc.contributor.authorHussien, NA
dc.contributor.editorWijesiriwardana, CP
dc.date.accessioned2022-12-05T05:21:43Z
dc.date.available2022-12-05T05:21:43Z
dc.date.issued2018
dc.description.abstractCloud Computing has captured the market as the most promising computing paradigm, where users are allowed to use computing resources in a flexible and cost effective manner. Data storage is one of the services provided by cloud computing, where large amounts of data can be stored in public cloud servers away from the users’ premises. Storing data away from users’ premises in shared devices creates many security issues. Encryption techniques have been commonly employed for the obscuring information before storing in these shared devices. In this paper, the authors review the techniques used for hiding data from malicious intruders with respect to their strengths and weaknesses.en_US
dc.identifier.citationM. F. M. Firdhous and N. A. Hussien, "Data Security Implementations in Cloud Computing: A Critical Review," 2018 3rd International Conference on Information Technology Research (ICITR), 2018, pp. 1-5, doi: 10.1109/ICITR.2018.8736153.en_US
dc.identifier.conference3rd International Conference on Information Technology Research 2018en_US
dc.identifier.departmentInformation Technology Research Unit, Faculty of Information Technology, University of Moratuwa.en_US
dc.identifier.doi10.1109/ICITR.2018.8736153en_US
dc.identifier.emailfirdhous@uom.lken_US
dc.identifier.emailnaseerali@uowasit.edu.iqen_US
dc.identifier.facultyITen_US
dc.identifier.proceedingProceedings of the 3rdth International Conference in Information Technology Research 2018en_US
dc.identifier.proceedingProceedings of the 3rd International Conference in Information Technology Research 2018en_US
dc.identifier.urihttp://dl.lib.uom.lk/handle/123/19627
dc.identifier.year2018en_US
dc.language.isoenen_US
dc.publisherInformation Technology Research Unit, Faculty of Information Technology, University of Moratuwa, Sri Lankaen_US
dc.relation.urihttps://ieeexplore.ieee.org/document/8736153en_US
dc.subjectData securityen_US
dc.subjectdata life cycleen_US
dc.subjectCIA triaden_US
dc.subjectEncryptionen_US
dc.subjectRAIDen_US
dc.subjectObfuscryptingen_US
dc.subjectAnonimizationen_US
dc.titleData security implementations in cloud computing: a critical reviewen_US
dc.typeConference-Full-texten_US

Files

Collections