{"title":"Measures to Protect Cloud Data: A Survey","authors":"Jeremy J. Mayerski, M. Chowdhury","doi":"10.1109/EIT51626.2021.9491872","DOIUrl":null,"url":null,"abstract":"Almost everything is stored in the cloud, from personal photos, and documents, to corporate files, health records, top secret government data and other sensitive information. People rely on this data to be kept safe and protected; This paper presents the measures that are in place to protect this data. Cloud platform is great for dealing with our such data. Although the cloud is great it has also got to have protection if anything should go awry, that is where the incident response comes into play, gauging the risks and vulnerabilities and coming up with solutions on how to respond to them.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Electro Information Technology (EIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIT51626.2021.9491872","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Almost everything is stored in the cloud, from personal photos, and documents, to corporate files, health records, top secret government data and other sensitive information. People rely on this data to be kept safe and protected; This paper presents the measures that are in place to protect this data. Cloud platform is great for dealing with our such data. Although the cloud is great it has also got to have protection if anything should go awry, that is where the incident response comes into play, gauging the risks and vulnerabilities and coming up with solutions on how to respond to them.