|
1.
Preventing Data Leakage in a Cloud Environment
Fuzhi Cang, Mingxing Zhang, Yongwei Wu, and Weimin Zheng
ZTE Communications
2013, 11 (4):
27-31.
DOI: DOI:10.3969/j.issn.1673-5188.2013.04.004
Despite the multifaceted advantages of cloud computing, concerns about data leakage or abuse impedes its adoption for security-sensitive tasks. Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services. Transparency and accountability for data managed in the cloud is necessary. Specifically, when using a cloudhost service, a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data. This is a multi-party system. Three particular trust models can be used according to the credibility of these providers. This paper describes techniques for preventing data leakage that can be used with these different models.
相关文章 |
多维度评价
|
|