云计算中敏感数据的安全架构

T. Mohammed, Ahmed Burhan Mohammed
{"title":"云计算中敏感数据的安全架构","authors":"T. Mohammed, Ahmed Burhan Mohammed","doi":"10.1145/3410352.3410828","DOIUrl":null,"url":null,"abstract":"Security of sensitive data in cloud computing is a very challenging. In computing platform, data is distributed among different systems in parallel and this makes the high of data leakage because it is present in various places around the world and shares in distributed systems. In this era of digitization security of data in cloud computing are the key factors in a user's point of view in cloud technology. Although many technologies have been researched and applied in academics and industries to solve cloud computing data security problems. Protection of data and privacy in cloud computing for sensitive data is more challenging for the next generation technologies of cloud computing technology in government organizations, banking, finance, private industries and the e commerce. Normally in cloud computing these issues in data which related to hardware and software can be avoided by applying data storing and retrieving architecture. One of the most important ways to work around this problem is to encrypt recreational data related to your own difficulties and provide the best architectures to secure data. In this paper we proposed three different architectures for securing data over cloud computing. In article we conduct a detail research and analysis of already existing solution related to sensitive data security architecture and protection of privacy used in the cloud computing technologies.","PeriodicalId":178037,"journal":{"name":"Proceedings of the 6th International Conference on Engineering & MIS 2020","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Security architectures for sensitive Data in Cloud Computing\",\"authors\":\"T. Mohammed, Ahmed Burhan Mohammed\",\"doi\":\"10.1145/3410352.3410828\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security of sensitive data in cloud computing is a very challenging. In computing platform, data is distributed among different systems in parallel and this makes the high of data leakage because it is present in various places around the world and shares in distributed systems. In this era of digitization security of data in cloud computing are the key factors in a user's point of view in cloud technology. Although many technologies have been researched and applied in academics and industries to solve cloud computing data security problems. Protection of data and privacy in cloud computing for sensitive data is more challenging for the next generation technologies of cloud computing technology in government organizations, banking, finance, private industries and the e commerce. Normally in cloud computing these issues in data which related to hardware and software can be avoided by applying data storing and retrieving architecture. One of the most important ways to work around this problem is to encrypt recreational data related to your own difficulties and provide the best architectures to secure data. In this paper we proposed three different architectures for securing data over cloud computing. In article we conduct a detail research and analysis of already existing solution related to sensitive data security architecture and protection of privacy used in the cloud computing technologies.\",\"PeriodicalId\":178037,\"journal\":{\"name\":\"Proceedings of the 6th International Conference on Engineering & MIS 2020\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 6th International Conference on Engineering & MIS 2020\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3410352.3410828\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 6th International Conference on Engineering & MIS 2020","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3410352.3410828","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

云计算中敏感数据的安全是一个非常具有挑战性的问题。在计算平台中,数据在不同的系统之间并行分布,由于数据分布在世界各地,并在分布式系统中共享,这就造成了数据泄漏的高发。在这个数字化时代,云计算中数据的安全性是从用户的角度考虑云技术的关键因素。尽管学术界和工业界已经研究并应用了许多技术来解决云计算数据安全问题。对于政府机构、银行、金融、私营行业和电子商务等云计算技术的下一代技术来说,保护敏感数据的云计算数据和隐私更具挑战性。通常在云计算中,通过应用数据存储和检索体系结构可以避免与硬件和软件相关的数据中的这些问题。解决此问题的最重要方法之一是加密与您自己的困难相关的娱乐数据,并提供最佳的体系结构来保护数据。在本文中,我们提出了三种不同的架构来保护云计算上的数据。本文对云计算技术中使用的敏感数据安全架构和隐私保护相关的现有解决方案进行了详细的研究和分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security architectures for sensitive Data in Cloud Computing
Security of sensitive data in cloud computing is a very challenging. In computing platform, data is distributed among different systems in parallel and this makes the high of data leakage because it is present in various places around the world and shares in distributed systems. In this era of digitization security of data in cloud computing are the key factors in a user's point of view in cloud technology. Although many technologies have been researched and applied in academics and industries to solve cloud computing data security problems. Protection of data and privacy in cloud computing for sensitive data is more challenging for the next generation technologies of cloud computing technology in government organizations, banking, finance, private industries and the e commerce. Normally in cloud computing these issues in data which related to hardware and software can be avoided by applying data storing and retrieving architecture. One of the most important ways to work around this problem is to encrypt recreational data related to your own difficulties and provide the best architectures to secure data. In this paper we proposed three different architectures for securing data over cloud computing. In article we conduct a detail research and analysis of already existing solution related to sensitive data security architecture and protection of privacy used in the cloud computing technologies.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信