2015
DOI: 10.1016/j.procs.2015.03.087
|View full text |Cite
|
Sign up to set email alerts
|

Data Classification for Achieving Security in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(27 citation statements)
references
References 11 publications
0
26
0
Order By: Relevance
“…measure in cloud computing [21] As mentioned earlier throughout the paper, data is a significant factor in cloud computing. Since data in a cloud computing technique possess various attributes, the security measures required for them also varies.…”
Section: Data Classification As a Securitymentioning
confidence: 95%
“…measure in cloud computing [21] As mentioned earlier throughout the paper, data is a significant factor in cloud computing. Since data in a cloud computing technique possess various attributes, the security measures required for them also varies.…”
Section: Data Classification As a Securitymentioning
confidence: 95%
“…Rizwana Shaikh and Dr. M. Sasikumar developed a technique for the classification in the cloud by identifying a set of parameters that could provide security based on the type of content and accessibility. The strength of the security offered was improved, but it failed to describe the classification procedure mathematically, rather than defining.…”
Section: Motivationmentioning
confidence: 99%
“…From the classification and privacy protection approaches studied in the literature, some of the challenges that the existing systems face are as follows: One of the major challenges in the methods used for privacy protection in the cloud is the number of attributes considered to offer privacy Implementing a classifier in the cloud environment is the second challenge, as the classifier must ensure security for the sensitive data. In cloud computing, data classification is crucial and is challenging, as it depends on the risk related to disclosure or the user information, such as user ID and usage patterns Another challenge that deals with the techniques providing security is the mixed attribute nature of the cloud data.…”
Section: Motivationmentioning
confidence: 99%
“…Zardari MA et.al [10] In this paper they had used the K-NN approach for in order to do classification of data inorder to provide the confidentiality of data.The main aim to classify data is to provide security.In this approach they classify the data into labels sensitive and non-sensitive data using K-NN algorithm.On the sensitive data the encryption is done inorder to provide the security.Classification is mainly performed because it become easy to select an appropriate security for data according to need of data.So this way it will enhance the security. Shaikh, Rizwana et.al [11] This paper had contributed another important technique inorder to enhance the security of data in cloud by considering the classification technique.In this different parameters are been taken into consideration to provide the classification of data and then on the classified data the encryption is performed.Different classification properties considered are access control, content and storage.On these properties the data classification is done and then the encryption is performed to enhance more security and better efficiency.Tawalbeh L et al [12] In this paper they had contributed the secure cloud computing model based on the classification which basically minimizes the overhead and processing time needed to secure the data through using different security mechanism with variable keysizes to provide the confidentiality level required for data.Classification is done by user manually and the encryption is been performed in three different level with different cryptographic algorithm.The levels are based on the sensitivity of data which includes Basic, Confidential and highly confidential level.The different cryptographic algorithm are been used at different levels to provide the security of data upto a great extent.…”
Section: Related Workmentioning
confidence: 99%