Survey of Data Protection Mechanisms to Protect Data at Rest on Cloud

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2018 by IJETT Journal
Volume-59 Number-2
Year of Publication : 2018
Authors : Omkar Ghaisas, Prof. Yogita Borse
  10.14445/22315381/IJETT-V59P217

MLA 

Omkar Ghaisas, Prof. Yogita Borse"Survey of Data Protection Mechanisms to Protect Data at Rest on Cloud", International Journal of Engineering Trends and Technology (IJETT), V59(2),105-107 May 2018. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Cloud computing is very advanced and widely used technology of today’s world. Cloud computing became famous after the advancements in storage capability of cloud. But cloud is a shared pool of resources. Hence our data is stored on public storage along with data of other cloud subscribers. This possesses the risk that our data might be compromised. Storage security mechanisms are required to protect data privacy and integrity. Data can be categorized into two categories which are data at transit and data at rest. This paper discuss the survey of different cloud providers with respect to data encryption, access control and data recovery on data at rest.

Reference
[1] Amazon Web Service .AWS Security Best Practices(Whitepaper)2016. Print.
[2] Amazon Web Service .Overview of AWS Security - Storage Services( Whitepaper)2016. Print.
[3] Google Cloud. G Suite Encryption Whitepaper. Print.
[4] Google cloud. Google Cloud Security and Compliance Whitepaper 2018. Print.
[5] Microsoft. Microsoft Azure Detail(Whitepaper)2018. Print.
[6] TCS- Windows Azure The Cloud Computing Platform TCS Perspectives( whitepaper)2018. Print.
[7] Microsoft .File security in Microsoft SharePoint and OneDrive for Business(Whitepaper)2016. Print.
[8] Dropbox. Privacy and Data Protection(Dropbox Business whitepaper) 2018 v2018.03.Print.
[9] Dropbox. Dropbox Business Security(Dropbox whitepaper)2018. Print

Keywords
Cloud computing, Data protection mechanisms, Storage security, Data at rest, Cloud comparison.