Breaking News
Comments
Newest First | Oldest First | Threaded View
simoniddings
User Rank
Author
re: Data security in cloud computing - Part 3: Cloud data protection methods
simoniddings   4/9/2012 3:10:18 AM
NO RATINGS
As more people shift operations to the cloud, the demand for greater cloud data security will rise. There are already many companies who specialise in data security, but it is also important for users to know how to protect themselves. This is quite a detailed article on data security, and I think I would have to send it to my printers so that I can read it in my own time later. Thanks for the information! Simon - http://www.idpro.co.uk

prabhakar_deosthali
User Rank
Author
re: Data security in cloud computing - Part 3: Cloud data protection methods
prabhakar_deosthali   8/11/2011 11:05:04 AM
NO RATINGS
A very informative article on secure data access over cloud. I was just wondering if , in addition to all the data protection methods enlisted in this articles, is it also possible to have some kind of data chaining. By data chaining I mean the sequence in which the applications would access various data objects. For all authorized applications there will be a predefined chain or sequence to access the data. If an out of sequence data request comes then we could suspect that it is from a spurious application trying to break-in.

EREBUS0
User Rank
Author
re: Data security in cloud computing - Part 3: Cloud data protection methods
EREBUS0   8/9/2011 1:29:50 AM
NO RATINGS
Good article, it explains the issues involved with trying secure information through the Cloud where you never know precisely where all of the copies and backups of the data may reside. Clearly, the simple file management techniques currently in use are inadequate to ensure the level of safety required for important data.



Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
Radio
LATEST ARCHIVED BROADCAST

What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.

Brought to you by:

Like Us on Facebook
Special Video Section
Wireless Power enables applications where it is difficult ...
07:41
LEDs are being used in current luxury model automotive ...
With design sizes expected to increase by 5X through 2020, ...
01:48
Linear Technology’s LT8330 and LT8331, two Low Quiescent ...
The quality and reliability of Mill-Max's two-piece ...
LED lighting is an important feature in today’s and future ...
05:27
The LT8602 has two high voltage buck regulators with an ...
05:18
Silego Technology’s highly versatile Mixed-signal GreenPAK ...
The quality and reliability of Mill-Max's two-piece ...
01:34
Why the multicopter? It has every thing in it. 58 of ...
Security is important in all parts of the IoT chain, ...
Infineon explains their philosophy and why the multicopter ...
The LTC4282 Hot SwapTM controller allows a board to be ...
This video highlights the Zynq® UltraScale+™ MPSoC, and sho...
Homeowners may soon be able to store the energy generated ...
The LTC®6363 is a low power, low noise, fully differential ...
See the Virtex® UltraScale+™ FPGA with 32.75G backplane ...
Vincent Ching, applications engineer at Avago Technologies, ...
The LT®6375 is a unity-gain difference amplifier which ...
The LTC®4015 is a complete synchronous buck controller/ ...
10:35