DCaP—Data Confidentiality and Privacy in Cloud Computing: Strategies and Challenges

Author(s):  
Basappa B. Kodada ◽  
Demian Antony D’Mello
2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


2012 ◽  
Vol 9 (3) ◽  
pp. 67-83 ◽  
Author(s):  
Stephen S. Yau ◽  
Ho G. An ◽  
Arun Balaji Buduru

In current cloud computing systems, because users’ data is stored and processed by computing systems managed and operated by various service providers, users are concerned with the risks of unauthorized usage of their sensitive data by various entities, including service providers. The current cloud computing systems protect users’ data confidentiality from all entities, except service providers. In this paper, an approach is presented for improving the protection of users’ data confidentiality in cloud computing systems from all entities, including service providers. The authors’ approach has the following features: (1) separation of cloud application providers, data processing service providers and data storage providers, (2) anonymization of users’ identities, (3) grouping cloud application components and distributing their execution to distinct cloud infrastructures of data processing service providers, and (4) use of data obfuscation and cryptography for protecting the sensitive data from unauthorized access by all entities, including service providers. The proposed approach ensures that users’ sensitive data can be protected from their service providers even if the users do not have full cooperation from their service providers.


2018 ◽  
Vol 134 ◽  
pp. 83-90 ◽  
Author(s):  
Khalid El Makkaoui ◽  
Abdellah Ezzati ◽  
Abderrahim Beni-Hssane ◽  
Slimane Ouhmad

2014 ◽  
Vol 1 (2) ◽  
pp. 13-19
Author(s):  
Dileep Kumar Reddy P ◽  
◽  
R. Praveen Sam ◽  
Shoba Bindu C ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document