International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 67 - Number 21 |
Year of Publication: 2013 |
Authors: Mervat Hashem, Zhiyong Li, Alaa Al Ghamry |
10.5120/11517-7192 |
Mervat Hashem, Zhiyong Li, Alaa Al Ghamry . Essential Cloud Storage Systems Security Methodologies. International Journal of Computer Applications. 67, 21 ( April 2013), 6-10. DOI=10.5120/11517-7192
The demand to have secure environments for systems' information on cloud systems is arising since this should be more secure and far away from our systems damage disasters and data corruption. The dream became real with the cloud computing. Cloud computing is being more famous and used especially in the enterprises where the cost matters. These enterprises can reduce IT costs by using cloud computing services. Most of the enterprises that don't use cloud computing have a fear of the platform security and the information security. The users always seek for verifying the confidentiality and integrity of their data and computations before using cloud computing. Many researches have been established in these two fields for the infrastructure, platform security, data confidentiality and integrity. This paper, presents two examples for platform security and a comparison between three techniques for how can users secure the data and computations, at cloud environment, to keep the confidentiality and integrity. The ultimate goal of providing such a comparison is to encourage enterprises and users to use the cloud storage systems on secure infrastructures and platforms that maintain their customers/own data privacy.