Different methods of distribution data in the cloud — Controlled by IT security specialist | IEEE Conference Publication | IEEE Xplore

Different methods of distribution data in the cloud — Controlled by IT security specialist


Abstract:

In spite of the fact that there is an increase in the usage of cloud storage services, there is still a significant number of client organizations that lack sufficient tr...Show More

Abstract:

In spite of the fact that there is an increase in the usage of cloud storage services, there is still a significant number of client organizations that lack sufficient trust in third party cloud providers. To improve the privacy of users and to ensure more secured data we have proposed a model for security in cloud computing, in the previous work [1]. Part of our proposed model is IT Security Specialist (ITSS) of the company i.e. that will control security in cloud computing. This solution is based on some ways of file encryption, partitioning, and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. In this paper we propose two new methods as part of our proposed model [1,2]. Based on the results of this work, we provide the comments in relations to the methods as a part of the proposed model of security in the cloud computing.
Date of Conference: 10-14 June 2018
Date Added to IEEE Xplore: 09 July 2018
ISBN Information:
Conference Location: Budva, Montenegro

Contact IEEE to Subscribe

References

References is not available for this document.