Data Protection Techniques for Building Trust in Cloud Computing

@article{Saeed2014DataPT,
  title={Data Protection Techniques for Building Trust in Cloud Computing},
  author={M. Y. Saeed and M. A. Khan},
  journal={International Journal of Modern Education and Computer Science},
  year={2014},
  volume={7},
  pages={38-47}
}
  • M. Y. Saeed, M. A. Khan
  • Published 2014
  • Computer Science, Engineering
  • International Journal of Modern Education and Computer Science
  • Cloud computing has played much important role in comparison to other fields of IT, in providing Data storage, Data security, Quality of Services (QoS) etc. In the last few years, it had emerged and evolved so quickly due to its number of facilities and advantages to the organizations and end users. Many data security factors have also increased due to this fast evolution of cloud in the IT industry. Therefore several security models and trust establishing techniques have been deployed and are… CONTINUE READING
    7 Citations

    Tables and Topics from this paper

    Explore Further: Topics Discussed in This Paper

    References

    SHOWING 1-10 OF 66 REFERENCES
    A security aspects in cloud computing
    • 88
    Centralized Database Security in Cloud
    • 17
    Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments
    • 179
    Enhanced data security model for cloud computing
    • 119
    MCDB: Using Multi-clouds to Ensure Security in Cloud Computing
    • M. Alzain, B. Soh, E. Pardede
    • Computer Science
    • 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing
    • 2011
    • 89
    • Highly Influential
    Data Security over Cloud
    • 35
    Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation
    • Akhil Behl
    • Computer Science
    • 2011 World Congress on Information and Communication Technologies
    • 2011
    • 179
    A privacy preserving repository for securing data across the cloud
    • 36
    HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY
    • 27
    • Highly Influential
    • PDF
    A Review of Trust Aspects in Cloud Computing Security
    • 42