earticle

논문검색

Security Techniques for Data Protection in Cloud Computing

원문정보

초록

영어

Cloud computing has a lot of security issues that are gaining great attention nowadays, including the data protection, network security, virtualization security, application integrity, and identity management. Data protection is one of the most important security issues, because organizations won’t transfer its data to remote machines if there is no guaranteed data protection from the cloud service providers. Many techniques are suggested for data protection in cloud computing, but there are still a lot of challenges in this subject. The most popular security techniques include SSL (Secure Socket Layer) Encryption, Intrusion Detection System; Multi Tenancy based Access Control, etc. Goal of this paper is to analyze and evaluate the most important security techniques for data protection in cloud computing. Furthermore, security techniques for data protection will be recommended in order to have improved security in cloud computing.

목차

Abstract
 1. Introduction
 2. Authentication in Cloud Computing
 3. Confidentiality in Cloud Computing
 4. Access Control in Cloud Computing
 5. Authorization in Cloud Computing
 6. Recommendations for Improved Data Security in Cloud Computing
  6.1. Data Protection in the Cloud
  6.2. Proper Usage of Administrative Privileges
  6.3. Wireless Access Control of the Data
  6.4. Data Recovery in Cloud Computing
  6.5. Boundary Defense of the Data in the Cloud
 7. Conclusion
 References

저자정보

  • Kire Jakimoski Faculty of Informatics, FON University, Skopje, Republic of Macedonia

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.