Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
Data Security Policies in Cloud: A Survey
Kasundra Punitkumar R., Shikha J. Pachouly
In our modern day and age, many enterprises are embracing cloud computing. However, one of the major concerns regarding cloud computing has always been security. Encryption in cloud is still in a state of flux and infancy. Some vendors provide encryption, while others dont. There are different kinds of encryption schemes for securing data in the cloud, sometimes integrated within a system. Whenever a company decides it move its applications to the cloud, it considers several pros and cons before doing so.in this paper various cloud data security policies like Mediated certification, Role based access control, data deduplication and data self- destruction are presented which assist in protection of data in cloud.
Keywords: Encryption, Data deduplication, data self-destruction, role base access, reencryption
Edition: Volume 3 Issue 12, December 2014
Pages: 1696 - 1700
How to Cite this Article?
Kasundra Punitkumar R., Shikha J. Pachouly, "Data Security Policies in Cloud: A Survey", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14848, Volume 3 Issue 12, December 2014, 1696 - 1700
112 PDF Views | 89 PDF Downloads
Similar Articles with Keyword 'Encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Similar Articles with Keyword 'Data deduplication'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1696 - 1700Data Security Policies in Cloud: A Survey
Kasundra Punitkumar R., Shikha J. Pachouly
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1258 - 1261Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud
P. Narasimhulu, Jayavarthini.C
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 1613 - 1618Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing
Nancy Digra, Sandeep Sharma
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1806 - 1810A Hybrid Cloud Approach for Secure Authorized Deduplication
Jagadish, Dr.Suvarna Nandyal
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1696 - 1698A Survey on Secure and Authorized Data Deduplication
Shweta Pochhi, Vanita Babanne