Using data taxonomy to achieve security in cloud computing Online publication date: Fri, 26-Jul-2019
by Ibtissam Ennajjar; Youness Tabii; Abdelhamid Benkaddour
International Journal of Computer Applications in Technology (IJCAT), Vol. 60, No. 4, 2019
Abstract: Cloud computing is a broad concept pertaining to different service models following the utility computing model. Owing to its numerous advantages like high resource elasticity, time improvement, IT maintenance cost reduction, and simplicity, cloud computing paradigm interests many customers. However, notions introduced by the cloud such as the multi-tenancy concept, the computation outsourcing, and the distributed resources increase the security concerns and make trust in cloud providers a critical security challenge. This paper suggests a new method for enhancing the confidentiality of data in the cloud. As data in the cloud has not the same sensitivity, encrypting it with the same algorithms can lead to a lack of security or of resources. The paper proposes to classify data according to a sensitivity level in order to give a suitable security model for each data. By this process, we optimise the use of security mechanisms and the resources consumption.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Computer Applications in Technology (IJCAT):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com