New approach for ensuring cloud computing security: using data hiding methods

24Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.

Abstract

Cloud computing is one of the largest developments occurred in the field of information technology during recent years. This model has become more desirable for all institutions, organizations and also for personal use thanks to the storage of ‘valuable information’ at low costs, access to such information from anywhere in the world as well as its ease of use and low cost. In this paper, the services constituting the cloud architecture and deployment models are examined, and the main factors in the provision of security requirements of all those models as well as points to be taken into consideration are described in detail. In addition, the methods and tools considering how security, confidentiality and integrity of the information or data that forms the basis of modern technology are implemented in cloud computing architecture are examined. Finally, it is proposed in the paper that the use of data hiding methods in terms of access security in cloud computing architecture and the security of the stored data would be very effective in securing information.

Cite

CITATION STYLE

APA

Yesilyurt, M., & Yalman, Y. (2016). New approach for ensuring cloud computing security: using data hiding methods. Sadhana - Academy Proceedings in Engineering Sciences, 41(11), 1289–1298. https://doi.org/10.1007/s12046-016-0558-8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free