Data Recovery and Security in Cloud

被引:0
|
作者
Surbiryala, Jayachander [1 ]
Rong, Chunming [1 ]
机构
[1] Univ Stavanger, Dept Elect Engn & Comp Sci, Stavanger, Norway
来源
2018 9TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA) | 2018年
关键词
Cloud Computing; Data Recovery; Cloud forensic reconstruction; Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has been evolving with an increasing popularity, which leads to the rapid adaption of cloud services for various reasons among the individuals and organizations. The main reason for this shift is because of the numerous benefits provided by cloud services such as low costs, computational power, and storage services over the Internet. Data recovery is one of the important concepts while dealing with storage devices which are basically the backbone of the cloud infrastructure. Someone with access to these servers or devices can use data recovery techniques to reconstruct the confidential data of customers once the customers have deleted their confidential or private data from the cloud. Reconstruction of such data leads to a security problem and privacy concerns for users. Even after some gains access to their data users are not aware that someone else has access to their data even though it has already deleted in their point of view from the cloud. In this paper, we look into the security problem which can arise based on the usage of data recovery tools on cloud infrastructure, once the users have deleted their data. To address this problem, we have proposed a simple method using Rename.
引用
收藏
页码:126 / 130
页数:5
相关论文
共 50 条
  • [1] Data Recovery in Cloud Using Forensic Tools
    Surbiryala, Jayachander
    Rong, Chunming
    2018 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA), 2018, : 309 - 314
  • [2] A Framework for Cloud Data Security
    Grover, Ankit
    Kaur, Banpreet
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1199 - 1203
  • [3] Modeling of Data Security in Cloud Computing
    Balogh, Zoltan
    Turcani, Milan
    2016 ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2016, : 940 - 945
  • [4] Network Data Security in Cloud Computing
    Li Zhichao
    Cui Congcong
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 445 - 449
  • [5] Inter Cloud Data Transfer Security
    Chalse, Rajkumar R.
    Katara, Arun
    Selokar, Ashwin
    Talmale, Roshani
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 654 - 657
  • [6] A Framework for Data Storage Security in Cloud
    Tyagi, Manoj
    Manoria, Manish
    Mishra, Bharat
    ADVANCES IN DATA AND INFORMATION SCIENCES, VOL 1, 2018, 38 : 263 - 272
  • [7] A Comparative Analysis on Cloud Data Security
    Varghese, Saira
    Vigila, S. Maria Celestin
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 495 - 498
  • [8] Cloud Computing, Security and Data Concealment
    Delettre, Christian
    Boudaoud, Karima
    Riveill, Michel
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,
  • [9] Data Security in the World of Cloud Computing
    Kaufman, Lori M.
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 61 - 64
  • [10] Survey on Data Recovery for Cloud Storage
    Shi, Xiaohong
    Guo, Kun
    Lu, Yueming
    Chen, Xi
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 176 - 184