Breaking News
Design How-To

Data security in cloud computing - Part 1: Overview

7/11/2011 03:54 PM EDT
2 comments
NO RATINGS
Page 1 / 4 Next >
More Related Links
View Comments: Newest First | Oldest First | Threaded View
Sajol4
User Rank
Rookie
re: Data security in cloud computing - Part 1: Overview
Sajol4   8/11/2011 9:35:25 PM
NO RATINGS
Some very good points - you may want to check out www.visral.com

EREBUS0
User Rank
Rookie
re: Data security in cloud computing - Part 1: Overview
EREBUS0   7/15/2011 8:41:13 PM
NO RATINGS
The only way I would even consider using the Cloud to store data would be if the following conditions were met. 1. Data is encrypted by the user and only the user has the decrypt key. 2. The data is sent to the cloud via a secure and encrypted connection. 3. No one can find any of my data in the Cloud. 4. The user is immediately notified if anyone tries to access the data. 5. Only the user can download the data from the Cloud to the Users system. Until these conditions are met, I have no interest in storing anything in the Cloud.

August Cartoon Caption Winner!
August Cartoon Caption Winner!
"All the King's horses and all the KIng's men gave up on Humpty, so they handed the problem off to Engineering."
5 comments
Top Comments of the Week
Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Times on Twitter
EE Times Twitter Feed
Flash Poll
Radio
LATEST ARCHIVED BROADCAST
David Patterson, known for his pioneering research that led to RAID, clusters and more, is part of a team at UC Berkeley that recently made its RISC-V processor architecture an open source hardware offering. We talk with Patterson and one of his colleagues behind the effort about the opportunities they see, what new kinds of designs they hope to enable and what it means for today’s commercial processor giants such as Intel, ARM and Imagination Technologies.