Data Security Policy In The Cloud Computing

被引:0
|
作者
Ran Shuanglin [1 ]
机构
[1] Guizhou Univ Nationalities, Commun Sch, Digital Media Dept, Guiyang, Peoples R China
关键词
Cloud computing; Data security; Protection strategy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The user concerns more and more about data security since off-site storage of data on cloud computing. So, we put forward management ideas of user data classification and designed a cloud-based data security policy through user demand for data security protection. It ensures that internal data is not spread to the public cloud through strong authentication, data evaluation classified, sensitive information filtering, cloud computing security gateway strategy and management to protect such as the security management, rules and regulations, safety education.
引用
收藏
页码:222 / 225
页数:4
相关论文
共 50 条
  • [41] A framework for Data Security and Storage in Cloud Computing
    Bhandari, Akshita
    Gupta, Ashutosh
    Das, Debasis
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [42] Study on Data Security Mechanism in Cloud Computing
    Sandha
    Durga, M. Ganaga
    [J]. SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 13 - 17
  • [43] Cloud Computing and Information Policy: Computing in a Policy Cloud?
    Jaeger, Paul T.
    Lin, Jimmy
    Grimes, Justin M.
    [J]. JOURNAL OF INFORMATION TECHNOLOGY & POLITICS, 2008, 5 (03) : 269 - 283
  • [44] Data Replication Policy in a Cloud Computing Environment
    da Silva, Gabriel Heleno Goncalves
    Holanda, Maristela
    Araujo, Aleteia
    [J]. 2016 11TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2016,
  • [45] Improving Data Integrity for Data Storage Security in Cloud Computing
    Pardeshi, Poonam M.
    Borade, Deepali R.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (06): : 75 - 82
  • [46] Improving Data Integrity for Data Storage Security in Cloud Computing
    Pardeshi, Poonam M.
    Borade, Deepali R.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (07): : 61 - 67
  • [47] Transformative computing in security, big data analysis, and cloud computing applications
    Ogiela, Lidia
    Leu, Fang-Yie
    Fiore, Ugo
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (23):
  • [48] Data Security in Cloud Computing Using AES Under HEROKU Cloud
    Lee, Bih-Hwang
    Dewi, Ervin Kusuma
    Wajdi, Muhammad Farid
    [J]. 2018 27TH WIRELESS AND OPTICAL COMMUNICATION CONFERENCE (WOCC), 2018, : 242 - 246
  • [49] Providing data security using DNA computing in the cloud computing environment
    Kumar, Tarun
    Namasudra, Suyel
    Kumar, Prabhat
    [J]. INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2023, 19 (04) : 463 - 486
  • [50] Data Security Implementations in Cloud Computing: A Critical Review
    Firdhous, M. F. M.
    Hussien, Naseer Ali
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY RESEARCH (ICITR), 2018,