Security of Data in Cloud Environment Using DPaaS
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2015, Vol 5, Issue 1
Abstract
The rapid development of cloud computing is giving way to more cloud services, due to which security of services of cloud especially data confidentiality protection, becomes more critical. Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use. Although cloud computing provides numerous advantages, a key challenge is how to ensure and build confidence that the cloud can handle user data securely. This paper highlights some major security issues that exist in current cloud computing environments. The status of the development of cloud computing security, the data privacy analysis, security audit, information check and another challenges that the cloud computing security faces have been explored. The recent researches on data protection regarding security and privacy issues in cloud computing have partially addressed some issues. The best option is to build data-protection solutions at the platform layer. The growing appeal of data protection as a service is that it enables to access just the resources you need at minimal upfront expense while providing the benefits of enterprise-class data protection capabilities. The paper proposes a solution to make existing developed applications for simple cloud Systems compatible with DPaaS. The various security challenges have been highlighted and the various necessary metrics required for designing DPaaS have been investigated.
Authors and Affiliations
Prabhleen Singh , Ketki Arora
Comparison of Conventional and “Satlevel” Collocation Model for Production of Contour Map of Yanbu Industrial City
Contour map is very useful as its portrays the three dimensional (3D) configuration of the area under study. Data acquisition by conventional method of production of such maps has been very tedious. There is need for sim...
A Novel Data Leakage Detection
Abstract: This paper contains concept of data leakage, its causes of leakage and different techniques to detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the f...
A Review on Six Sigma (DMAIC) Methodology
The growth rate of fair-size institutions and Organization is directly related to the implementation of Six Sigma Methodology. This paper consists of detailed analysis regarding application of six sigma Methodo...
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Radio Network
Scarcity of spectrum is the issue that wireless communication technology has to deal with. Primary user is the licensed user of the spectrum. When primary user is idle or not using the spectrum secondary user c...
Study of Strain in Elasto-Plastic Material by X-Ray Diffraction Technique
This research paper highlights the applicability of X-ray diffraction method to evaluate the strain in elasto-plastic material like concrete.The aim of this study is to explore the possibilities of X-Ray diffraction tech...