2016
DOI: 10.14257/ijgdc.2016.9.1.05
|View full text |Cite
|
Sign up to set email alerts
|

Security Techniques for Data Protection in Cloud Computing

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(22 citation statements)
references
References 5 publications
0
22
0
Order By: Relevance
“…The algorithm however fails to secure data-at-rest and noticeable levels of overheads are observed. The author in [1] proposed a platform for the analysis and evaluation of cloud security techniques. A mixture of encryption, data loss prevention, integrity protection, authentication and authorization techniques were employed for data security.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…The algorithm however fails to secure data-at-rest and noticeable levels of overheads are observed. The author in [1] proposed a platform for the analysis and evaluation of cloud security techniques. A mixture of encryption, data loss prevention, integrity protection, authentication and authorization techniques were employed for data security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cloud computing is presented as a data sharing and storage platform based on secure, cost-effective, scalable and flexible IT infrastructure in [1,2]. Its main focus is on sustaining the confidentiality and integrity of data by addressing the risk of theft, tampering, loss and unavailability of data [1,2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…But the main drawback of like this technique is that, it cannot prevent identity theft, and cannot apply online security to prevent accounts from fraudulent transactions. Kire Jakimoski in his paper [15] analyzed and evaluated the security techniques for data protection in the cloud computing. The paper suggested a two-factor authentication as boundary defense of the data in the cloud.…”
Section: Literature Surveymentioning
confidence: 99%
“…Jakimoski et al [9] analyzed and evaluated the most important security techniques for data protection that are already accepted from the cloud computing providers. They classified them in four sections according to the security mechanisms that they provide: authentication, confidentiality, access control and authorization.…”
Section: Related Workmentioning
confidence: 99%