R. N. S. Jyothi, J. Sireesha, A. Mahitha, B. Ruchitha, E. Deepthi
{"title":"Protection and Saving of Delicate Data by using Cloud Computing","authors":"R. N. S. Jyothi, J. Sireesha, A. Mahitha, B. Ruchitha, E. Deepthi","doi":"10.1109/ICEARS53579.2022.9752329","DOIUrl":null,"url":null,"abstract":"In the case of sensitive information, the term \"delicate data\" refers to information that should only be accessed by a small group of persons. If sensitive data is misplaced or misused, the persons or organisation to whom it belongs may suffer irreparable harm. When it comes to protecting people’s personal communications and financial information, privacy no longer equates to concealment. The likelihood of a privacy breach increases as sensitive data is exploited, and as a result, users' faith in cloud providers decreases. Managing data is one of the most important duties in today’s internet-driven society. The fact that financial and healthcare data is being kept on the cloud makes it more difficult to complete these activities, which must be handled on a worldwide scale. In this research, numerous methods for protecting sensitive data are examined and a new method based on a cryptographic algorithm for preserving the confidentiality of sensitive data is suggested. In the following section, the method is compared against a data leak detection method. Last but not least, the outcomes show that the proposed strategy is a superior technique for safeguarding the confidentiality of sensitive information.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEARS53579.2022.9752329","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In the case of sensitive information, the term "delicate data" refers to information that should only be accessed by a small group of persons. If sensitive data is misplaced or misused, the persons or organisation to whom it belongs may suffer irreparable harm. When it comes to protecting people’s personal communications and financial information, privacy no longer equates to concealment. The likelihood of a privacy breach increases as sensitive data is exploited, and as a result, users' faith in cloud providers decreases. Managing data is one of the most important duties in today’s internet-driven society. The fact that financial and healthcare data is being kept on the cloud makes it more difficult to complete these activities, which must be handled on a worldwide scale. In this research, numerous methods for protecting sensitive data are examined and a new method based on a cryptographic algorithm for preserving the confidentiality of sensitive data is suggested. In the following section, the method is compared against a data leak detection method. Last but not least, the outcomes show that the proposed strategy is a superior technique for safeguarding the confidentiality of sensitive information.