Protection and Saving of Delicate Data by using Cloud Computing

R. N. S. Jyothi, J. Sireesha, A. Mahitha, B. Ruchitha, E. Deepthi
{"title":"Protection and Saving of Delicate Data by using Cloud Computing","authors":"R. N. S. Jyothi, J. Sireesha, A. Mahitha, B. Ruchitha, E. Deepthi","doi":"10.1109/ICEARS53579.2022.9752329","DOIUrl":null,"url":null,"abstract":"In the case of sensitive information, the term \"delicate data\" refers to information that should only be accessed by a small group of persons. If sensitive data is misplaced or misused, the persons or organisation to whom it belongs may suffer irreparable harm. When it comes to protecting people’s personal communications and financial information, privacy no longer equates to concealment. The likelihood of a privacy breach increases as sensitive data is exploited, and as a result, users' faith in cloud providers decreases. Managing data is one of the most important duties in today’s internet-driven society. The fact that financial and healthcare data is being kept on the cloud makes it more difficult to complete these activities, which must be handled on a worldwide scale. In this research, numerous methods for protecting sensitive data are examined and a new method based on a cryptographic algorithm for preserving the confidentiality of sensitive data is suggested. In the following section, the method is compared against a data leak detection method. Last but not least, the outcomes show that the proposed strategy is a superior technique for safeguarding the confidentiality of sensitive information.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEARS53579.2022.9752329","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In the case of sensitive information, the term "delicate data" refers to information that should only be accessed by a small group of persons. If sensitive data is misplaced or misused, the persons or organisation to whom it belongs may suffer irreparable harm. When it comes to protecting people’s personal communications and financial information, privacy no longer equates to concealment. The likelihood of a privacy breach increases as sensitive data is exploited, and as a result, users' faith in cloud providers decreases. Managing data is one of the most important duties in today’s internet-driven society. The fact that financial and healthcare data is being kept on the cloud makes it more difficult to complete these activities, which must be handled on a worldwide scale. In this research, numerous methods for protecting sensitive data are examined and a new method based on a cryptographic algorithm for preserving the confidentiality of sensitive data is suggested. In the following section, the method is compared against a data leak detection method. Last but not least, the outcomes show that the proposed strategy is a superior technique for safeguarding the confidentiality of sensitive information.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用云计算保护和保存敏感数据
在敏感信息的情况下,术语“敏感数据”是指只能由一小部分人访问的信息。如果敏感数据被放错地方或滥用,其所属的个人或组织可能遭受无法弥补的伤害。当涉及到保护人们的个人通信和财务信息时,隐私不再等同于隐藏。随着敏感数据被利用,隐私泄露的可能性增加,因此,用户对云提供商的信心下降。在当今互联网驱动的社会中,管理数据是最重要的职责之一。财务和医疗保健数据保存在云中,这使得完成这些必须在全球范围内处理的活动变得更加困难。本文研究了多种保护敏感数据的方法,提出了一种基于加密算法的保护敏感数据机密性的新方法。在下一节中,将该方法与数据泄漏检测方法进行比较。最后,结果表明,所提出的策略对于保护敏感信息的机密性是一种优越的技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Solar Tracker Using Micro-controller "Core Strength" of Dance Lala Training Considering the Body Motion Tracking Video and Predictive Model Textile Antenna –Structure, Material and Applications Automated Classification of Atherosclerosis in Coronary Computed Tomography Angiography Images Based on Radiomics Study Using Automatic Machine Learning Cryptocurrency Exchange Rate Prediction using ARIMA Model on Real Time Data
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1