Survey on Centric Data Protection Method for Cloud Storage Application

N. Sultana, K. Srinivas
{"title":"Survey on Centric Data Protection Method for Cloud Storage Application","authors":"N. Sultana, K. Srinivas","doi":"10.1109/iccica52458.2021.9697235","DOIUrl":null,"url":null,"abstract":"IT personnel are being reassigned the ability to alter resources to suit business shifting needs as businesses compete to get their applications up and operating quicker with increased manageability and less preservation. The Cloud Computing Mechanism, which is distinguished by a \"pay as you go\" pricing model, can help with this. An on-demand pool of adjustable computer resources is provided as part of the paradigm, along with storage options. There are security risks and weaknesses with Cloud Computing, just like with any new technology. These risks and vulnerabilities include illegal eavesdropping and data tampering, deliberate malicious data mutations, data loss and identity theft. Because of these security flaws, cloud computing is now a hot topic for researchers. An indepth look into cloud security research and mitigation methods is presented in this article. Among organizations, cloud storage and cloud services are the most commonly used applications. These two areas, however, present the greatest number of risks and security issues. Outsourcing sensitive data to cloud service providers (CSPs) creates trust difficulties within enterprises as a result of this arrangement. A comparative study of cloud storage and cloud service security frameworks is presented in this paper, which sheds light on the need for additional research.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccica52458.2021.9697235","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

IT personnel are being reassigned the ability to alter resources to suit business shifting needs as businesses compete to get their applications up and operating quicker with increased manageability and less preservation. The Cloud Computing Mechanism, which is distinguished by a "pay as you go" pricing model, can help with this. An on-demand pool of adjustable computer resources is provided as part of the paradigm, along with storage options. There are security risks and weaknesses with Cloud Computing, just like with any new technology. These risks and vulnerabilities include illegal eavesdropping and data tampering, deliberate malicious data mutations, data loss and identity theft. Because of these security flaws, cloud computing is now a hot topic for researchers. An indepth look into cloud security research and mitigation methods is presented in this article. Among organizations, cloud storage and cloud services are the most commonly used applications. These two areas, however, present the greatest number of risks and security issues. Outsourcing sensitive data to cloud service providers (CSPs) creates trust difficulties within enterprises as a result of this arrangement. A comparative study of cloud storage and cloud service security frameworks is presented in this paper, which sheds light on the need for additional research.
云存储应用中心数据保护方法研究
IT人员被重新分配了改变资源的能力,以适应业务变化的需求,因为企业竞相提高其应用程序的运行速度,提高可管理性,减少保存。以“随用随付”定价模式著称的云计算机制可以帮助解决这个问题。作为范例的一部分,提供了可调整计算机资源的按需池,以及存储选项。与任何新技术一样,云计算也存在安全风险和弱点。这些风险和漏洞包括非法窃听和数据篡改、蓄意恶意数据突变、数据丢失和身份盗窃。由于这些安全漏洞,云计算现在是研究人员的热门话题。本文将深入研究云安全研究和缓解方法。在组织中,云存储和云服务是最常用的应用程序。然而,这两个领域带来了最多的风险和安全问题。由于这种安排,将敏感数据外包给云服务提供商(csp)会在企业内部造成信任困难。本文对云存储和云服务安全框架进行了比较研究,指出了进一步研究的必要性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信