Data Protection as a service in Cloud

Yemineni Ashok, J. Bhargav

Abstract


Cloud computing enable highly scalable services to be easily consumed over the internet as and when needed. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. Providing a strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.


References


Dawn Song, Elaine Shi, Ian Fischer, UmeshShankar.â€Cloud Data Protection For The Masses†Computer,vol. 45(1),Jan 2012 page(s): 39-45.

C. Dwork, “The Differential Privacy Frontier Extended Abstract,†Proc. 6th Theory of Cryptography Conf.(TCC 09),LNCS 5444, Springer, 2009, pp. 496-502.

Hyubgun Lee, Kyounghwa Lee, YongtaeShin,Department of Computing, SoongsilUniversity.“AES Implementation and Performance Evaluation on 8-bit Microcontrollersâ€, International Journal of Computer Science and Information Security (pp. 070-074)

P. Maniatis et al., “Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection,†Proc.13thUsenixConf.HotTopics in OperatingSystems(HotOS11),Usenix,2011; www.usenix.org/events/hotos11/tech/final_files/ManiatisAkha we.pdf.

Casey, Eoghan; Stellatos, Gerasimos J. "The impact of full disk encryption on digital forensics". Operating Systems Review 42 (3),2008 page(s); 93–98.

Peter Norton and Scott Clark. “Peter Norton's New Inside the PCâ€. Sams Publishing,2002, pp. 360–361.

N.Janardhan ,Y.RajaSree , R.Himaja, Cloud Data Protection for the Masses publish in ijctt (volume4Issue4 –April 2013 )


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â