This paper is published in Volume-8, Issue-4, 2022
Area
Data Security
Author
Sagar Bagale, Sudhir Shinde
Org/Univ
Nagesh Karajagi Orchid College of Engineering and Technology, Solapur, Maharashtra, India
Pub. Date
18 July, 2022
Paper ID
V8I4-1165
Publisher
Keywords
Cloud Computing, Security, Privacy, Confidential Data

Citationsacebook

IEEE
Sagar Bagale, Sudhir Shinde. Confidential data protection using a multi-level security approach in the cloud, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Sagar Bagale, Sudhir Shinde (2022). Confidential data protection using a multi-level security approach in the cloud. International Journal of Advance Research, Ideas and Innovations in Technology, 8(4) www.IJARIIT.com.

MLA
Sagar Bagale, Sudhir Shinde. "Confidential data protection using a multi-level security approach in the cloud." International Journal of Advance Research, Ideas and Innovations in Technology 8.4 (2022). www.IJARIIT.com.

Abstract

Cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. This exciting computing model depends on data traffic and is controlled by a third party. Despite the expected savings in infrastructure and the development cost for business flexibility, security is still the biggest challenge for the implementation of computing for many service-based companies. Security in cloud computing is mainly focused on the protection and guaranteeing data security. This paper discusses challenges related to data security and privacy implementation in a cloud computing environment. A multiple-level approach is proposed to accommodate the protection of confidential data in a cloud computing environment. This framework consists of different levels application security level, keyword-based file search, public key, and fingerprint verification level. The main objective of this paper is to discuss the framework implementation and its architecture verification. It is expected from the research a verified framework to protect private and confidential data in a cloud environment.