2021
DOI: 10.3991/ijoe.v17i14.27365
|View full text |Cite
|
Sign up to set email alerts
|

Sensitive Data Exposure: Data Forwarding and Storage on Cloud Environment

Abstract: Sensitive data has become an essential part of life today. With the increase in sensitive data, the importance of maintaining its confidentiality and integrity has increased. One of the solutions became to store this data in the cloud. But the risk of revealing this data still exists. This is because the rate of attack, leakage and loss of this data has become a serious matter. The importance of sensitive data in our current era is considered our oil, as it is very important in several uses in statistical anal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Internet of things (IoT) technology was used to detect and monitor the gas level using gas sensors and send gas-level data to the cloud via the IoT platform. The gas level is also analyzed periodically, and a daily alert notification is sent to the administrator via social media via smartphone if there is a gas leak in the house [11][12][13]. When surveying the previous works, it was noted that the proposed systems were directed to protect factories and buildings, but there were no previous works aimed at protecting and controlling gas systems in vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…Internet of things (IoT) technology was used to detect and monitor the gas level using gas sensors and send gas-level data to the cloud via the IoT platform. The gas level is also analyzed periodically, and a daily alert notification is sent to the administrator via social media via smartphone if there is a gas leak in the house [11][12][13]. When surveying the previous works, it was noted that the proposed systems were directed to protect factories and buildings, but there were no previous works aimed at protecting and controlling gas systems in vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…Each client's pattern of computer usage [7] is presented in the data sequence pattern, which is similar to the other client's computer usage sequence pattern. If the first: client's working pattern deviates from his usual prior pattern of computer usage, the second: the sensitive data [8] are breached, the third: a client tries to neglect the organizational computer usage regulation (prohibit activities), and the fourth: client is not following to his assigned authorization rights, then this client will be suddenly purged his transaction processing. After that, his activity and evidence will be sent to his boss.…”
Section: Introductionmentioning
confidence: 99%