Review On Data Security Technology Based on Cloud Storage

Authors

  • Surender Kumar Head/Assistant Professor, P.G. Department of Computer Science, Sri Guru Teg Bahadur Khalsa College, Sri Anandpur Sahib, (An Autonomous College) Punjab (India)

Abstract

Data security has become a major concern as cloud storage systems have been more widely used in a variety of complicated environments. It is possible that data may be incomplete due to node failures or other external intrusions, but it is also possible that cloud service providers actively hide or other circumstances make it difficult for the user to be aware of the change. Approaching the issue of security with more prudence is necessary There have been several techniques created to safeguard files and other information as computer and communication technologies have evolved. The term "computer network security" refers to a combination of tools, processes, rules, and solutions that are used to prevent and respond to assaults on a network. All of these ideas must be defined and learned in order to properly assess an organization's security posture. Some of the methods and dangers to the network and computers are discussed in this document, along with possible programmes.

References

[1] Zhang Qian, Yang Huibi. Exploration of big data security and privacy protection under cloud computing[J]. Science Popular (Science Education), 2017, 000(010):192-192.

[2] Yuan Huihua. Research on Data Security in Big Data Cloud Computing Environment[J]. Information Technology and Informatization, 2019.

[3] S. Sharma, "Data Integrity Challenges in Cloud Computing", 4 th international conference on recent innovations in science engineering and management, pp. 736-7436, 2016.

[4] DIGITAL GUARDIAN [online] https://digitalguardian.com/blog/what-cloud-encryption (Accessed 25 December 2019).

[5] G.K. Ravikumar "Design of Data Masking Architecture and Analysis of Data Masking Techniques for Testing", International journal of engineering science and Technology, vol. 3, no. 6, pp. 5150-5159, 2011.

Downloads

Published

2022-01-06

How to Cite

[1]
Surender Kumar 2022. Review On Data Security Technology Based on Cloud Storage. AG Volumes. (Jan. 2022), 99–106.