Skip to content

Mechanisms for protecting sensitive information in cloud computing

Research output: Contribution to journalArticle

Original languageEnglish
Pages (from-to)357-376
Number of pages20
JournalComputer Systems Science and Engineering
Volume28
Issue number6
DatePublished - 2013

Abstract

In this paper a variety of approaches are presented and assessed that may be used to protect personal and business confidential information within the cloud. Some of these approaches are available for use now; others are relatively immature, but are being currently researched and improved, and look promising for future use. The most appropriate approach varies according to the context and stakeholder requirements and in particular the type of data to be processed or application to be run in the cloud.

    Research areas

  • Cloud computing, Encryption, Hybrid cloud, Privacy, Security, Technology, Trusted computing, Virtual private cloud

Documents

View research connections

Related faculties, schools or groups