Survey of Privacy Data Protection Technology in Cloud Computing

Yang Wang

Abstract


Cloud computing is very populate because of computing and storage resources. Users are likely to upload their privacy data to the Cloud computing platform, which may easily suffer security threats and vulnerabilities, including secure data transmission, data loss, data breach, malicious insiders, account/service hijacking. In order to protect privacy data, kinds of technologies are proposed including data encryption, data isolation, access control, cipher text retrieval, data auditing and copyright protection.


DOI
10.12783/dtcse/icte2016/4795

Refbacks

  • There are currently no refbacks.