Data Classification for achieving Security in cloud computing

被引:43
作者
Shaikh, Rizwana [1 ]
Sasikumar, M. [2 ]
机构
[1] SIES Grad Sch Technol, Nerul Navi Mumabi, India
[2] CDAC Kharghar, Navi Mumabi, India
来源
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA) | 2015年 / 45卷
关键词
Cloud Computing; Data; Data Classification; Security;
D O I
10.1016/j.procs.2015.03.087
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data is the valuable asset and of great concerns when moving towards the cloud. Data privacy and security is the active area of research and experimentations in cloud computing. Data leakage and privacy protection is becoming crucial for many organizations moving on to cloud. Data can be of various types and degree of protection required for all the data is also varies. Here we are proposing a classification technique that defines various parameters. Parameters are defined based on various dimensions. Data security can be provided based on the level and the required protection. Corresponding security provisions at the storage can be applied based on data set classified as per the dimensions. The efficiency of the proposed classification scheme is analyzed with the sample dataset collected. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:493 / 498
页数:6
相关论文
共 14 条
[1]  
Barker Ken, 2009, DATA PRIVACY TAXONOM
[2]   Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems [J].
Barsoum, Ayad ;
Hasan, Anwar .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (12) :2375-2385
[3]  
Cheng Ningning, 2013, IEEE INT C COMP COMM
[4]  
Cheng Y, 2013, PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), P723
[5]   Retaining Data Control to the Client in Infrastructure Clouds [J].
Descher, Marco ;
Masser, Philip ;
Feilhauer, Thomas ;
Tjoa, A. Min ;
Huemer, David .
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, :9-+
[6]  
Dutch Mike, 2010, DATA PROTECTION TAXO
[7]   A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud [J].
Hu, Ji ;
Klein, Andreas .
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, :735-740
[8]  
Krishnamurthy B., 2008, WORKSHOP ONLINE SOCI, P37, DOI DOI 10.1145/1397735.1397744
[9]   Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption [J].
Li, Ming ;
Yu, Shucheng ;
Zheng, Yao ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (01) :131-143
[10]  
Pearson S, 2009, CLOUD: 2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING CHALLENGES OF CLOUD COMPUTING, P44, DOI 10.1109/CLOUD.2009.5071532