Data Security using Proxy Based Methods in Cloud Computing
DOI:
https://doi.org/10.5281/zenodo.5219654Keywords:
Cloud Computing, Security, ProxyAbstract
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user’s concerns about the cloud technology. Though many techniques on the topics in cloud computinghave been investigated in both academics and industries, data security and privacy protection are becomingmore important for the future development of cloud computing technology in government, industry, and business. Data security and privacy protectionissues are relevant to both hardware and software in the cloud architecture. This study is to review different security techniques andchallenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security andprivacy protection for the trustworthy cloud environment. In this paper, we make a comparative research analysis of the existingresearch work regarding the data security and privacy protection techniques used in the cloud computing.
Downloads
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Lakshmi K Ramachandrappa, Renukaradhya P C
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.