2018
DOI: 10.14257/ijfgcn.2018.11.1.03
|View full text |Cite
|
Sign up to set email alerts
|

Secured Identity Management System for Preserving Data Privacy and Transmission in Cloud Computing

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…The organization can face problems of great risk in this situation. There can be possibility of data breach, if there is no provision of data security in the adopted cloud service [11] Before going for adoption of cloud-base service, define level of privacy required Choose vendors who can provide required service with the required data privacy provisions [11] Event log management and notification It is already discussed that the organization does not have control of data and visibility. On cloud if the network gets compromised, then problem is to identify what resources and data are compromised.…”
Section: Cloud User (Cu)mentioning
confidence: 99%
“…The organization can face problems of great risk in this situation. There can be possibility of data breach, if there is no provision of data security in the adopted cloud service [11] Before going for adoption of cloud-base service, define level of privacy required Choose vendors who can provide required service with the required data privacy provisions [11] Event log management and notification It is already discussed that the organization does not have control of data and visibility. On cloud if the network gets compromised, then problem is to identify what resources and data are compromised.…”
Section: Cloud User (Cu)mentioning
confidence: 99%