Security of Data in Cloud Environment Using DPaaS
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2015, Vol 5, Issue 1
Abstract
The rapid development of cloud computing is giving way to more cloud services, due to which security of services of cloud especially data confidentiality protection, becomes more critical. Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use. Although cloud computing provides numerous advantages, a key challenge is how to ensure and build confidence that the cloud can handle user data securely. This paper highlights some major security issues that exist in current cloud computing environments. The status of the development of cloud computing security, the data privacy analysis, security audit, information check and another challenges that the cloud computing security faces have been explored. The recent researches on data protection regarding security and privacy issues in cloud computing have partially addressed some issues. The best option is to build data-protection solutions at the platform layer. The growing appeal of data protection as a service is that it enables to access just the resources you need at minimal upfront expense while providing the benefits of enterprise-class data protection capabilities. The paper proposes a solution to make existing developed applications for simple cloud Systems compatible with DPaaS. The various security challenges have been highlighted and the various necessary metrics required for designing DPaaS have been investigated.
Authors and Affiliations
Prabhleen Singh , Ketki Arora
Modal Analysis of Adhesively Bonded Joints of Different Materials
Abstract: It is important to study the modal analysis (natural frequency and mode shape) of the single lap adhesive joint to understand the dynamic nature of the systems, and also in design and control. In this wor...
Prediction of Phishing Websites Using Optimization Techniques
Phishing website is a fraudulent attempt usually made through email, to steal personal information. Phishing emails usually appear to come from a well-known organization and ask for personal information such as c...
A Novel Multi Port Dc/Dc Converter Topology Using Zero Voltage Switching For Renewable Energy Applications
This paper proposes a novel dc/dc converter topology that interfaces the non-conventional energy sources. It consists of four power ports: two sources (namely solar and wind), one bidirectional storage port, and on...
Performance of MMSE Denoise Signal Using LS-MMSE Technique
This paper presents performance of mmse denoises signal using consistent cycle spinning (ccs) and least square (LS) techniques. In the past decade, TV denoise technique is used to reduced the noisy signal. The main drawb...
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computing Architecture
Cloud computing is an attracting technology in the field of computer science. In Gartner’s report, it says that the cloud will bring changes to the IT industry. The cloud is changing our life by providing users...