Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Preventing Data Leakage in a Cloud Environment
Fuzhi Cang, Mingxing Zhang, Yongwei Wu, and Weimin Zheng
ZTE Communications    2013, 11 (4): 27-31.   DOI: DOI:10.3969/j.issn.1673-5188.2013.04.004
Abstract61)      PDF (346KB)(112)       Save
Despite the multifaceted advantages of cloud computing, concerns about data leakage or abuse impedes its adoption for security-sensitive tasks. Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services. Transparency and accountability for data managed in the cloud is necessary. Specifically, when using a cloudhost service, a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data. This is a multi-party system. Three particular trust models can be used according to the credibility of these providers. This paper describes techniques for preventing data leakage that can be used with these different models.
Related Articles | Metrics