Breaking News
Design How-To

Data security in cloud computing - Part 3: Cloud data protection methods

8/8/2011 02:52 PM EDT
3 comments
NO RATINGS
1 saves
Page 1 / 5 Next >
More Related Links
View Comments: Newest First | Oldest First | Threaded View
simoniddings
User Rank
Rookie
re: Data security in cloud computing - Part 3: Cloud data protection methods
simoniddings   4/9/2012 3:10:18 AM
NO RATINGS
As more people shift operations to the cloud, the demand for greater cloud data security will rise. There are already many companies who specialise in data security, but it is also important for users to know how to protect themselves. This is quite a detailed article on data security, and I think I would have to send it to my printers so that I can read it in my own time later. Thanks for the information! Simon - http://www.idpro.co.uk

prabhakar_deosthali
User Rank
CEO
re: Data security in cloud computing - Part 3: Cloud data protection methods
prabhakar_deosthali   8/11/2011 11:05:04 AM
NO RATINGS
A very informative article on secure data access over cloud. I was just wondering if , in addition to all the data protection methods enlisted in this articles, is it also possible to have some kind of data chaining. By data chaining I mean the sequence in which the applications would access various data objects. For all authorized applications there will be a predefined chain or sequence to access the data. If an out of sequence data request comes then we could suspect that it is from a spurious application trying to break-in.

EREBUS0
User Rank
Rookie
re: Data security in cloud computing - Part 3: Cloud data protection methods
EREBUS0   8/9/2011 1:29:50 AM
NO RATINGS
Good article, it explains the issues involved with trying secure information through the Cloud where you never know precisely where all of the copies and backups of the data may reside. Clearly, the simple file management techniques currently in use are inadequate to ensure the level of safety required for important data.

Most Recent Comments
Hailey McKeefry
 
AKH0
 
sleibson-xilinx
 
David Ashton
 
mhrackin
 
Max The Magnificent
 
mhrackin
 
Max The Magnificent
 
Max The Magnificent
Radio
NEXT UPCOMING BROADCAST
EE Times Senior Technical Editor Martin Rowe will interview EMC engineer Kenneth Wyatt.
Top Comments of the Week
Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Times on Twitter
EE Times Twitter Feed
Flash Poll