首页> 外文会议>IEEE International Conference on Power, Control, Signals and Instrumentation Engineering >Suitability of different cryptographic approaches for securing data centric applications
【24h】

Suitability of different cryptographic approaches for securing data centric applications

机译:适用于保护以数据为中心的应用程序的不同加密方法的适用性

获取原文

摘要

Data centric applications generating huge data need secure storage and regulated access. Because of growing expenses of capacity and management of sensitive information, outsourcing is fast developing. Cloud computing offers potential advantages including cost savings and improved business outcomes for applications keen on sharing and spreading their own data. But while outsourcing data in cloud, the information is controlled by an outsider, the information proprietor does not have full control on information at all stages. So, a few noteworthy issues and concerns, for example, information security, trust regulations and performance analysis have also seen the lights of the day. In this paper three major methodologies for secure information sharing in cloud computing environment is discussed.
机译:生成大量数据的以数据为中心的应用程序需要安全的存储和受监管的访问。由于容量和敏感信息管理费用的增加,外包正在快速发展。对于渴望共享和传播自己的数据的应用程序,云计算具有潜在的优势,包括节省成本和改善业务成果。但是,在将数据外包到云中时,信息是由外部人控制的,信息所有者并没有在所有阶段都完全控制信息。因此,一些值得注意的问题和担忧,例如信息安全,信任法规和性能分析,也已成为当今的亮点。本文讨论了在云计算环境中安全信息共享的三种主要方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号