Security Techniques for Data Protection in Cloud Computing

被引:26
作者
Jakimoski, Kire [1 ]
机构
[1] FON Univ, Fac Informat, Skopje, Macedonia
来源
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING | 2016年 / 9卷 / 01期
关键词
access control; authentication; authorization; cloud computing; confidentiality; data protection;
D O I
10.14257/ijgdc.2016.9.1.05
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing has a lot of security issues that are gaining great attention nowadays, including the data protection, network security, virtualization security, application integrity, and identity management. Data protection is one of the most important security issues, because organizations won't transfer its data to remote machines if there is no guaranteed data protection from the cloud service providers. Many techniques are suggested for data protection in cloud computing, but there are still a lot of challenges in this subject. The most popular security techniques include SSL (Secure Socket Layer) Encryption, Intrusion Detection System; Multi Tenancy based Access Control, etc. Goal of this paper is to analyze and evaluate the most important security techniques for data protection in cloud computing. Furthermore, security techniques for data protection will be recommended in order to have improved security in cloud computing.
引用
收藏
页码:49 / 56
页数:8
相关论文
共 8 条
[1]   Single password authentication [J].
Acar, Tolga ;
Belenkiy, Mira ;
Kupcu, Alptekin .
COMPUTER NETWORKS, 2013, 57 (13) :2597-2614
[2]  
Badger L., 2011, NIST SPECIA IN PRESS
[3]  
Brunette G., 2009, SECURITY GUIDANCE CR, P1
[4]   A privacy preserving authorisation system for the cloud [J].
Chadwick, David W. ;
Fatema, Kaniz .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (05) :1359-1373
[5]   Controllable privacy preserving search based on symmetric predicate encryption in cloud storage [J].
Fan, Chun-I ;
Huang, Shi-Yuan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1716-1724
[6]  
Hange Michael, 2011, SECURITY RECOMMENDAT
[7]   Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol [J].
Khalid, Umer ;
Ghafoor, Abdul ;
Irum, Misbah ;
Shibli, Muhammad Awais .
17TH INTERNATIONAL CONFERENCE IN KNOWLEDGE BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS - KES2013, 2013, 22 :680-688
[8]   Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers [J].
Wang, Guojun ;
Liu, Qin ;
Wu, Jie ;
Guo, Minyi .
COMPUTERS & SECURITY, 2011, 30 (05) :320-331