Ensuring Confidentiality, Authentication & Integrity (CIA) for Cloud Computing

Provided by: International Journal of Advance Research in Science and Engineering (IJARSE)
Topic: Security
Format: PDF
It has been widely observed that the concept of cloud computing has become one of major theory in the world of IT industry. It involves storing the user's data to be able to use the applications and services that the clouds introduce. By sending the data to be processed in the cloud, data owners transfer control of their data to a remote party that may raise security challenges. One of these risks that can attack the cloud computing is the integrity of the data stored in the cloud and also the privacy of that stored data on the cloud server.

Find By Topic