Please use this identifier to cite or link to this item:
https://hdl.handle.net/10321/4199
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lourens, Melanie Elizabeth | en_US |
dc.contributor.author | Naureen, Ayesha | en_US |
dc.contributor.author | Guha, Shouvik Kumar | en_US |
dc.contributor.author | Ahamad, Shahanawaj | en_US |
dc.contributor.author | Dharamvir | en_US |
dc.contributor.author | Tripathi, Vikas | en_US |
dc.date.accessioned | 2022-08-26T13:07:44Z | - |
dc.date.available | 2022-08-26T13:07:44Z | - |
dc.date.issued | 2022-04-28 | - |
dc.identifier.citation | Lourens, M.E. et al. 2022. Circumstantial discussion on security and privacy protection using cloud computing technology. 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). Presented at: 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). : 1589-1593. doi:10.1109/icacite53722.2022.9823875 | en_US |
dc.identifier.isbn | 9781665437899 | - |
dc.identifier.uri | https://hdl.handle.net/10321/4199 | - |
dc.description.abstract | Cloud computing is becoming a demanding technology due to its flexibility, sensibility and remote accessibility. Apart from these applications of cloud computing, privacy and security are two terms that pose a circumstantial discussion. Various authors have argued on this topic that cloud computing is more secure than other data sharing and storing methods. The conventional data storing system is a computer system or smartphone storage. The argument debate also states that cloud computing is vulnerable to enormous types of attacks which make it a more concerning technology. This current study has also tried to draw the circumstantial and controversial debate on the security and privacy system of cloud computing. Primary research has been conducted with 65 cloud computing experts to understand whether a cloud computing security technique is highly secure or not. An online survey has been conducted with them where they provided their opinions based on the security and privacy system of cloud computing. Findings showed that no particular technology is available which can provide maximum security. Although the respondents agreed that blockchain is a more secure cloud computing technology; however, the blockchain also has certain threats which need to be addressed. The study has found essential encryption systems that can be integrated to strengthen security; however, continuous improvement is required. | en_US |
dc.format.extent | 5 p. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Encryption systems | en_US |
dc.subject | Blockchain | en_US |
dc.subject | Threats | en_US |
dc.subject | Security | en_US |
dc.title | Circumstantial discussion on security and privacy protection using cloud computing technology | en_US |
dc.type | Conference | en_US |
dc.date.updated | 2022-08-24T10:03:48Z | - |
dc.relation.conference | 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) | en_US |
dc.identifier.doi | 10.1109/icacite53722.2022.9823875 | - |
item.grantfulltext | open | - |
item.cerifentitytype | Publications | - |
item.fulltext | With Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.openairetype | Conference | - |
item.languageiso639-1 | en | - |
Appears in Collections: | Research Publications (Management Sciences) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Lourens et al Circumstantial_2022.pdf | Article | 526.85 kB | Adobe PDF | View/Open |
ICACITE Copyright clearance.docx | Copyright Clearance | 240.9 kB | Microsoft Word XML | View/Open |
Page view(s)
339
checked on Dec 22, 2024
Download(s)
100
checked on Dec 22, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.