Data Centric Access Security- an Improvised Technique to Achieve Security in Cloud Environment
Smita Sharma1, R.P.Singh2

1Smita Sharma* , Department of Computer Science & Eng, SSSUTMS, Sehore India.
2R.P.Singh, Vice Chancellor SSSUTMS, Sehore, India

Manuscript received on October 14, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 1394-1399 | Volume-9 Issue-1, November 2019. | Retrieval Number: A3912119119/2019©BEIESP | DOI: 10.35940/ijitee.A3875.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing innovation has now turned into a good substitute to traditional computing technological developments This advancement of technology offers a new concept of a charge-per-use access resource model based primarily on virtualization technology. Because of the numerous advantages they offer, cloud computing concepts are achieving rapid adoption. This would comprise price-efficiency, time involved, and effective use of assets in computation. Given these advantages, there are many barriers to the widespread acceptance of this emerging technology, particularly data privacy and security issues. In extension to the conventional security hazards faced by internet-connected computer systems, cloud systems have relevant privacy and security problems due to the virtualization and multi-tenancy environment of the cloud. A further research target is focused on principles of Trust Computing (TC). Although these techniques offer users with mechanisms for evaluating and assessing security, they do not yield enough controlling functionality for users. In addition, Data Centric Security (DCS) is an evolving strategy intended to protect the data itself against migration towards the cloud.
Keywords: Cloud Computing, Data Security, Data Centric Security, Encryption, Trusted Computing, CRT.
Scope of the Article: Cloud Computing