Comprehensive and Comparative Analysis of Compliances and Data Privacy Techniques for protecting Data Leakages in Cloud Computing
Main Article Content
Abstract
In the present era, much data and operations are being processed online. Today, an individual or a business organization has to utilize the data or a process regardless of where they are working with the help of computers or smart devices. Most notably, the Internet of Things (IoT) allows devices like sensors to transfer data with the help of the Internet. Consequently, accessing data and processes from anywhere is becoming an essential requirement in the modern day. In the beginning ages of computing and even the Internet, data were stored in a centralized database and processed either on a local machine or on the server side. During those periods, users had to shell out vast amounts of money to store data and install software products. However, after the genesis of Cloud Computing (CC), the problem of investing amounts for storage and software installation became optimal. Nowadays, Cloud Companies offer various services to their users with essential security and authentication methods. Nevertheless, they cannot offer any elucidation regarding data privacy and do not provide any promise about data leakage on the cloud. Currently, a plethora of data privacy practices, like data anonymization, pseudonymization, scrambling and masking, etc., are implemented in CC to protect data privacy. This paper discusses a deep analysis of the merits and demerits of those methods, along with case studies and applications.
Article Details
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.