{"title":"云计算中敏感数据的安全架构","authors":"T. Mohammed, Ahmed Burhan Mohammed","doi":"10.1145/3410352.3410828","DOIUrl":null,"url":null,"abstract":"Security of sensitive data in cloud computing is a very challenging. In computing platform, data is distributed among different systems in parallel and this makes the high of data leakage because it is present in various places around the world and shares in distributed systems. In this era of digitization security of data in cloud computing are the key factors in a user's point of view in cloud technology. Although many technologies have been researched and applied in academics and industries to solve cloud computing data security problems. Protection of data and privacy in cloud computing for sensitive data is more challenging for the next generation technologies of cloud computing technology in government organizations, banking, finance, private industries and the e commerce. Normally in cloud computing these issues in data which related to hardware and software can be avoided by applying data storing and retrieving architecture. One of the most important ways to work around this problem is to encrypt recreational data related to your own difficulties and provide the best architectures to secure data. In this paper we proposed three different architectures for securing data over cloud computing. In article we conduct a detail research and analysis of already existing solution related to sensitive data security architecture and protection of privacy used in the cloud computing technologies.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Security architectures for sensitive Data in Cloud Computing\",\"authors\":\"T. Mohammed, Ahmed Burhan Mohammed\",\"doi\":\"10.1145/3410352.3410828\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security of sensitive data in cloud computing is a very challenging. In computing platform, data is distributed among different systems in parallel and this makes the high of data leakage because it is present in various places around the world and shares in distributed systems. In this era of digitization security of data in cloud computing are the key factors in a user's point of view in cloud technology. Although many technologies have been researched and applied in academics and industries to solve cloud computing data security problems. Protection of data and privacy in cloud computing for sensitive data is more challenging for the next generation technologies of cloud computing technology in government organizations, banking, finance, private industries and the e commerce. Normally in cloud computing these issues in data which related to hardware and software can be avoided by applying data storing and retrieving architecture. One of the most important ways to work around this problem is to encrypt recreational data related to your own difficulties and provide the best architectures to secure data. In this paper we proposed three different architectures for securing data over cloud computing. In article we conduct a detail research and analysis of already existing solution related to sensitive data security architecture and protection of privacy used in the cloud computing technologies.\",\"PeriodicalId\":178037,\"journal\":{\"name\":\"Proceedings of the 6th International Conference on Engineering & MIS 2020\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 6th International Conference on Engineering & MIS 2020\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3410352.3410828\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 6th International Conference on Engineering & MIS 2020","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3410352.3410828","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security architectures for sensitive Data in Cloud Computing
Security of sensitive data in cloud computing is a very challenging. In computing platform, data is distributed among different systems in parallel and this makes the high of data leakage because it is present in various places around the world and shares in distributed systems. In this era of digitization security of data in cloud computing are the key factors in a user's point of view in cloud technology. Although many technologies have been researched and applied in academics and industries to solve cloud computing data security problems. Protection of data and privacy in cloud computing for sensitive data is more challenging for the next generation technologies of cloud computing technology in government organizations, banking, finance, private industries and the e commerce. Normally in cloud computing these issues in data which related to hardware and software can be avoided by applying data storing and retrieving architecture. One of the most important ways to work around this problem is to encrypt recreational data related to your own difficulties and provide the best architectures to secure data. In this paper we proposed three different architectures for securing data over cloud computing. In article we conduct a detail research and analysis of already existing solution related to sensitive data security architecture and protection of privacy used in the cloud computing technologies.