Data centric access security-an improvised technique to achieve security in cloud environment

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing innovation has now turned into a good substitute to traditional computing technological developments This advancement of technology offers a new concept of a charge-per-use access resource model based primarily on virtualization technology. Because of the numerous advantages they offer, cloud computing concepts are achieving rapid adoption. This would comprise price-efficiency, time involved, and effective use of assets in computation. Given these advantages, there are many barriers to the widespread acceptance of this emerging technology, particularly data privacy and security issues. In extension to the conventional security hazards faced by internet-connected computer systems, cloud systems have relevant privacy and security problems due to the virtualization and multi-tenancy environment of the cloud. A further research target is focused on principles of Trust Computing (TC). Although these techniques offer users with mechanisms for evaluating and assessing security, they do not yield enough controlling functionality for users. In addition, Data Centric Security (DCS) is an evolving strategy intended to protect the data itself against migration towards the cloud.

Cite

CITATION STYLE

APA

Sharma, S., & Singh, R. P. (2019). Data centric access security-an improvised technique to achieve security in cloud environment. International Journal of Innovative Technology and Exploring Engineering, 9(1), 1394–1399. https://doi.org/10.35940/ijitee.A3875.119119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free