Data security and privacy protection in cloud computing: A review

1Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is still identified as an essential information technology whose usage and interests have risen to the brim. The application of cloud computing is witnessed to be characterized by increased interest. As a result, efforts have been made by various bodies of concern with the view of evaluating the current security trends to identify the threats and solve them. A good example is as observed with the ENISA organization that is concerned with matters regarding the security for information and network of the European countries (Krutz and Vines in Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Hoboken, Wiley, 2010) [1]. Another body that has been observed to be providing security guidance is the Cloud Security Alliance. The CSA has a guidance protocol that defines the domains of the security that congregate some specific functional aspects. Cloud computing security threats are of different kinds. Some of the much-known classes include interface security, network security, governance, data security, legal issues, compliance, and virtualization. These classes were broken down to identify some of the specific threats and the preventive measures that will help in combating them.

Cite

CITATION STYLE

APA

Anusha Linda Kostka, J. E., & Vinila Jinny, S. (2021). Data security and privacy protection in cloud computing: A review. In Advances in Intelligent Systems and Computing (Vol. 1167, pp. 253–257). Springer. https://doi.org/10.1007/978-981-15-5285-4_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free