Data security implementations in cloud computing: a critical review
dc.contributor.author | Firdhous, MFM | |
dc.contributor.author | Hussien, NA | |
dc.contributor.editor | Wijesiriwardana, CP | |
dc.date.accessioned | 2022-12-05T05:21:43Z | |
dc.date.available | 2022-12-05T05:21:43Z | |
dc.date.issued | 2018 | |
dc.description.abstract | Cloud Computing has captured the market as the most promising computing paradigm, where users are allowed to use computing resources in a flexible and cost effective manner. Data storage is one of the services provided by cloud computing, where large amounts of data can be stored in public cloud servers away from the users’ premises. Storing data away from users’ premises in shared devices creates many security issues. Encryption techniques have been commonly employed for the obscuring information before storing in these shared devices. In this paper, the authors review the techniques used for hiding data from malicious intruders with respect to their strengths and weaknesses. | en_US |
dc.identifier.citation | M. F. M. Firdhous and N. A. Hussien, "Data Security Implementations in Cloud Computing: A Critical Review," 2018 3rd International Conference on Information Technology Research (ICITR), 2018, pp. 1-5, doi: 10.1109/ICITR.2018.8736153. | en_US |
dc.identifier.conference | 3rd International Conference on Information Technology Research 2018 | en_US |
dc.identifier.department | Information Technology Research Unit, Faculty of Information Technology, University of Moratuwa. | en_US |
dc.identifier.doi | 10.1109/ICITR.2018.8736153 | en_US |
dc.identifier.email | firdhous@uom.lk | en_US |
dc.identifier.email | naseerali@uowasit.edu.iq | en_US |
dc.identifier.faculty | IT | en_US |
dc.identifier.proceeding | Proceedings of the 3rdth International Conference in Information Technology Research 2018 | en_US |
dc.identifier.proceeding | Proceedings of the 3rd International Conference in Information Technology Research 2018 | en_US |
dc.identifier.uri | http://dl.lib.uom.lk/handle/123/19627 | |
dc.identifier.year | 2018 | en_US |
dc.language.iso | en | en_US |
dc.publisher | Information Technology Research Unit, Faculty of Information Technology, University of Moratuwa, Sri Lanka | en_US |
dc.relation.uri | https://ieeexplore.ieee.org/document/8736153 | en_US |
dc.subject | Data security | en_US |
dc.subject | data life cycle | en_US |
dc.subject | CIA triad | en_US |
dc.subject | Encryption | en_US |
dc.subject | RAID | en_US |
dc.subject | Obfuscrypting | en_US |
dc.subject | Anonimization | en_US |
dc.title | Data security implementations in cloud computing: a critical review | en_US |
dc.type | Conference-Full-text | en_US |