A Survey on Essential Strategies for Avoiding Cloud Data Leaks
AUTHORS
Ch. Sudhakar,Asst. Prof, Department of Computer Science and Engineering, Vignan’s Institute of Information Technology, Visakhapatnam, AP, India
S. NagaMallik Raj,Asst. Prof, Department of Computer Science and Engineering, Vignan’s Institute of Information Technology, Visakhapatnam, AP, India
ABSTRACT
As of late, there has been a tremendous development from putting away information the customary route, as the cloud has developed and turned into the better answer and alternative for organizations and associations alike. Notwithstanding, this has additionally prompted a development in digital culprits and information breaks now that somebody can get to touchy archives from their lounge room love seat. In that capacity, cloud information spills have turned into a very regular issue for organizations. More news has examined approaches to counteract breaks, and you can discover a plenty of articles that discuss about huge and little organizations alike being assaulted. Therefore, knowing how to keep a cloud information spill is the initial phase in protecting your business and data. In this paper there are a couple of the best and most straightforward methodologies to maintain a strategic distance from cloud information spills.
KEYWORDS
Cloud computing, Encryption, Security, Password, Backup
REFERENCES
[1] P. Mell and T. Grance, “The NIST definition of cloud computing,” NIST special publication, (2011)
[2] Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-the-art and research challenges,” Journal of Internet Services and Applications, vol. 1, no. 1, pp. 7-18, Apr, (2010) DOI: 10.1007/s13174-010-0007-6(CrossRef)(Google Scholar)
[3] W. a Jansen, “Cloud hooks: Security and privacy issues in cloud computing,” in 2011 44th Hawaii International Conference on System Sciences, pp.1-10 (2011) DOI: 10.1109/HICSS.2011.103(CrossRef)(Google Scholar)
[4] S. Berman and L. Kesterson-Townes, “The power of cloud. driving business model innovation,” IBM Institute for Business, (2012)
[5] Vijaya Lakshmi Paruchuri., “Cloud computing for smart grids,” International Journal of Cloud-Computing and Super-Computing, vol. 3, no.2, pp.19-26, (2016) DOI:10.21742/IJCS.2016.3.2.03 (CrossRef)(Google Scholar)
[6] Kondapalli Kanaka Rao, “Cloud computing to develop applications,” International Journal of Cloud-Computing and Super-Computing, vol. 4, no. 1, pp:9-14, (2017) DOI:10.21742/IJCS.2017.4.1.02(CrossRef)(Google Scholar)
[7] N. Vaishnava Dhaatri, “Cloud storage systems in service diversity,” International Journal of Cloud-Computing and Super-Computing, vol. 4, no. 1, pp:15-20, Jun, 2017, (2017) DOI:10.21742/IJCS.2017.4.1.03 (CrossRef)(Google Scholar)
[8] Durga Bhavani Dasari, “Cloud-based venue recommendation framework,” International Journal of Cloud-Computing and Super-Computing, vol. 4, no. 1, pp:21-26, (2017) DOI:10.21742/IJCS.2017.4.1.04 (CrossRef)(Google Scholar)
[9] Anand Mishra, “The review of trends in smart grid and its applications,” International Journal of Cloud-Computing and Super-Computing, vol. 4, no. 1, pp:27-34, (2017) DOI:10.21742/IJCS.2017.4.1.05 (CrossRef)(Google Scholar)