Summary Report: Ensuring Data Security and Breach Protection
VerifiedAdded on 2023/06/12
|9
|2956
|205
Report
AI Summary
This summary report addresses the critical need for data security in today's digital age, highlighting the increasing frequency and cost of cyberattacks, particularly within educational institutions. It outlines key areas for data preservation, including organizational infrastructure, technological concerns, and data curation. The report identifies common reasons for data loss, such as user error, hardware failure, viruses, and unauthorized access, emphasizing the challenges institutions face in managing and securing growing volumes of data. Furthermore, it proposes strategies for data breach protection, stressing staff awareness, strong password practices, updated antivirus software, regular secured backups, and data encryption. The report also explores five backup storage options: cloud storage (iCloud, Google Drive, OneDrive, Dropbox), external hard drives, CDs/DVDs/Blu-ray discs, USB flash drives, and NAS devices, weighing their advantages and disadvantages. Finally, it references the "Data Security and Breach Notification Act of 2015" and recommends its implementation, along with cloud storage solutions, to safeguard data and comply with federal regulations, emphasizing the importance of notifying users in the event of a data breach. Desklib provides access to this document along with a wealth of study resources.

Running head: SUMMARY REPORT
Summary Report
Name of Student-
Name of University-
Author’s Note-
Summary Report
Name of Student-
Name of University-
Author’s Note-
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1Summary Report
Need of Data Security
In today’s digitization era, one of the topmost concerns is the cybersecurity. Nowadays
cyberattacks are becoming more frequent. In a survey conducted in 2016, there is an increase of 38% of
cyberattacks from the year 2014 (Sharif et al., 2015). The incidents of cyber attacks are very costly. The
average cost that was studied in 2015 due to data breach was about 3.79 million dollar, including the U.S.
companies with an average cost of about 6.53 million dollar. The study was carried out for about mean
time of 206 days and the data breach was carried out for a mean time of 69 days. The U.S. companies
were rated as the highest region of facing cyber attack with an average cost of about 15 million dollar out
of 7.1 million dollar of total cybercrime that was held globally.
The datasets of an educational institute is shared across the institution as because all
departments needs datasets to work with (Ali, Malik & Khan, 2017). There should a mixture of policies,
resources, and process for preserving the data sets of an organization. For preventing the data, there
should also be good staffs and the technologies that are to be used is to be updated. Proper data
management strategies are to be followed to mitigate the threats that are related to data breach and also
mitigates data breach risks. By implementing proper data management strategy, the data can be re-
analyzed and reused for the future.
Data prevention planned by institutions
There are basically three main areas by which the data preservation is divided into. According to
the International Federation of Data Organization, three main areas for addressing the data prevention
strategy are as follows:
Organizational Infrastructure: The organizational infrastructure consists of policies, practices,
people, and procedures should include regulatory and legal frameworks, preserve knowledge,
skills, and ways for resource planning and funding (Bhanot & Hans, 2015).
Technological Concerns: The technological concerns include software, refreshment strategies,
hardware, media technologies, and equipments.
Data Curation: In data curation, there are pre-ingest initiatives of data. The data curation also
includes ingest functions, preservation, providing and disseminating data access for different
community of data and archival storage.
Reasons for Data Loss in Educational Institutions
There are many ways by which a data can be modified or can be changed leading to data breach.
Other unknown person can delete or modify the data accidentally or deliberately. There are many cause
Need of Data Security
In today’s digitization era, one of the topmost concerns is the cybersecurity. Nowadays
cyberattacks are becoming more frequent. In a survey conducted in 2016, there is an increase of 38% of
cyberattacks from the year 2014 (Sharif et al., 2015). The incidents of cyber attacks are very costly. The
average cost that was studied in 2015 due to data breach was about 3.79 million dollar, including the U.S.
companies with an average cost of about 6.53 million dollar. The study was carried out for about mean
time of 206 days and the data breach was carried out for a mean time of 69 days. The U.S. companies
were rated as the highest region of facing cyber attack with an average cost of about 15 million dollar out
of 7.1 million dollar of total cybercrime that was held globally.
The datasets of an educational institute is shared across the institution as because all
departments needs datasets to work with (Ali, Malik & Khan, 2017). There should a mixture of policies,
resources, and process for preserving the data sets of an organization. For preventing the data, there
should also be good staffs and the technologies that are to be used is to be updated. Proper data
management strategies are to be followed to mitigate the threats that are related to data breach and also
mitigates data breach risks. By implementing proper data management strategy, the data can be re-
analyzed and reused for the future.
Data prevention planned by institutions
There are basically three main areas by which the data preservation is divided into. According to
the International Federation of Data Organization, three main areas for addressing the data prevention
strategy are as follows:
Organizational Infrastructure: The organizational infrastructure consists of policies, practices,
people, and procedures should include regulatory and legal frameworks, preserve knowledge,
skills, and ways for resource planning and funding (Bhanot & Hans, 2015).
Technological Concerns: The technological concerns include software, refreshment strategies,
hardware, media technologies, and equipments.
Data Curation: In data curation, there are pre-ingest initiatives of data. The data curation also
includes ingest functions, preservation, providing and disseminating data access for different
community of data and archival storage.
Reasons for Data Loss in Educational Institutions
There are many ways by which a data can be modified or can be changed leading to data breach.
Other unknown person can delete or modify the data accidentally or deliberately. There are many cause

2Summary Report
of such data disruption. Some factors that lead to data breach are as follows: due to user error that may
happen due to overwriting the data or accidentally deletion of data in collaborative environment (Bertino,
2016). Data breach can also happen due to hardware failure, power failure, or might be due to corruption
of software. There may be computer viruses that might also lead to data breach. There may also be
phenomenon of natural disaster that may lead to physical destruction of data and there can also be
unauthorized access for the data that are commonly represented as stolen user data or hacking user
data.
Moreover, the educational institutions are facing data breach due to the growing number of data.
Huge amount of data are very difficult to manage and leads to data breach. The institutions cannot
provide data security because of many reasons. Firstly, because amount of data are increasing
tremendously and the storage space is decreasing. Due to high volume of data, there are institution or
colleges are not able to store the data safely or keep backup of the data. The hacking threats and the
attacks are increasing day by day and are very difficult to prevent (Shaikh & Sasikumar, 2015). Out of
date software also leads to high risk of data breach. If the infrastructure or the hardware or software is not
updated from time to time, they may lead to data breach. Sometimes, the government also fails to provide
data protection law for the companies. The government of the company should provide law of data
protection for protecting the data from data breach.
Ensuring Data Breach Protection Strategies for Data Breach
The staffs who are associated with the college or the educational institute should know about the
data breach and should know about how to protect the data against any data breach. There should be a
proper defense for data loss protection for securing the data. Protection for data loss includes: the
Students, staffs, and teachers should be aware of the fact data breach and should use password for
security of data. The passwords that are to be used by the users are to be changed within an interval of
some days and the passwords are to be strong so that other cannot access the password and the data of
the system. Sometime, obsolete anti-virus and firewalls can also lead to data breach. The anti-virus
should be kept updated to prevent data breach. Secondly, the user of data should keep regular secured
backups for all the data that are present in the system. The security of backup is the most important thing
that is to be maintained by the institution (Zhang et al., 2017). The behavior of students and the staffs on
the network are to be monitored by the maintenance team. Most of the data loss occurs by installing
unknown applications on mobile phones. The maintenance team should limit the installation of other
applications on phones that are connected to the organization’s database. The organizations are to use a
technique of data encryption for protecting highly sensitive data from data breach. Copying data in to pen
drives or similar storage device should be prohibited completely because such devices also may lead to
some wirus or malware cause data breach.
of such data disruption. Some factors that lead to data breach are as follows: due to user error that may
happen due to overwriting the data or accidentally deletion of data in collaborative environment (Bertino,
2016). Data breach can also happen due to hardware failure, power failure, or might be due to corruption
of software. There may be computer viruses that might also lead to data breach. There may also be
phenomenon of natural disaster that may lead to physical destruction of data and there can also be
unauthorized access for the data that are commonly represented as stolen user data or hacking user
data.
Moreover, the educational institutions are facing data breach due to the growing number of data.
Huge amount of data are very difficult to manage and leads to data breach. The institutions cannot
provide data security because of many reasons. Firstly, because amount of data are increasing
tremendously and the storage space is decreasing. Due to high volume of data, there are institution or
colleges are not able to store the data safely or keep backup of the data. The hacking threats and the
attacks are increasing day by day and are very difficult to prevent (Shaikh & Sasikumar, 2015). Out of
date software also leads to high risk of data breach. If the infrastructure or the hardware or software is not
updated from time to time, they may lead to data breach. Sometimes, the government also fails to provide
data protection law for the companies. The government of the company should provide law of data
protection for protecting the data from data breach.
Ensuring Data Breach Protection Strategies for Data Breach
The staffs who are associated with the college or the educational institute should know about the
data breach and should know about how to protect the data against any data breach. There should be a
proper defense for data loss protection for securing the data. Protection for data loss includes: the
Students, staffs, and teachers should be aware of the fact data breach and should use password for
security of data. The passwords that are to be used by the users are to be changed within an interval of
some days and the passwords are to be strong so that other cannot access the password and the data of
the system. Sometime, obsolete anti-virus and firewalls can also lead to data breach. The anti-virus
should be kept updated to prevent data breach. Secondly, the user of data should keep regular secured
backups for all the data that are present in the system. The security of backup is the most important thing
that is to be maintained by the institution (Zhang et al., 2017). The behavior of students and the staffs on
the network are to be monitored by the maintenance team. Most of the data loss occurs by installing
unknown applications on mobile phones. The maintenance team should limit the installation of other
applications on phones that are connected to the organization’s database. The organizations are to use a
technique of data encryption for protecting highly sensitive data from data breach. Copying data in to pen
drives or similar storage device should be prohibited completely because such devices also may lead to
some wirus or malware cause data breach.

3Summary Report
5 Ways to Back up the Data
There are many ways to keep the data as a backup storage. Similar five backup storage plans
are described in this section which may prevent data loss or data breach.
Keep the Data on Cloud: The cloud service is one of the most famous services for storing the
data along with security. The encryption process offers end-to-end encryption so that the data are kept
safe (Pancholi & Patel, 2016). The cloud storage has free storage space, and the fees for the cloud
storage are very less as compared to other backup processes. The cloud storage data can be accessed
both from the mobile and from the computer device as well. There are big cloud service providers that
include:
iCloud: This is cloud storage for Apple products that has 5GB of data storage. The users of windows are
able to synchronize the files with a drive known as iCloud.
Google Drive: The Google Drive is cloud storage for the android users. The users of Windows and Mac
are able to download the desktop application version for accessing the drag and drop capability. The
Google drive service gives 15 GB fee storage to the users.
OneDrive: The OneDrive is a cloud storage that is accessible for Windows 10. Devices of Android and
iOS can access the OneDrive storage with the help of a map. OneDrive offers 5GB of storage space for
the users (Puthal et al., 2015).
Dropbox: This is a new technology of storage on cloud. The Dropbox can be used both personally and
professionally. The user has to do subscription for using the Dropbox. There is almost about 2GB of data
space.
It is better to avoid all the new cloud storage for the Royal College. The new cloud storage cannot be
trusted with the security of data (Pant, Prakash & Asthana, 2015). it is better to choose old mediums of
cloud storage.
Advantages of Cloud Storage:
5 Ways to Back up the Data
There are many ways to keep the data as a backup storage. Similar five backup storage plans
are described in this section which may prevent data loss or data breach.
Keep the Data on Cloud: The cloud service is one of the most famous services for storing the
data along with security. The encryption process offers end-to-end encryption so that the data are kept
safe (Pancholi & Patel, 2016). The cloud storage has free storage space, and the fees for the cloud
storage are very less as compared to other backup processes. The cloud storage data can be accessed
both from the mobile and from the computer device as well. There are big cloud service providers that
include:
iCloud: This is cloud storage for Apple products that has 5GB of data storage. The users of windows are
able to synchronize the files with a drive known as iCloud.
Google Drive: The Google Drive is cloud storage for the android users. The users of Windows and Mac
are able to download the desktop application version for accessing the drag and drop capability. The
Google drive service gives 15 GB fee storage to the users.
OneDrive: The OneDrive is a cloud storage that is accessible for Windows 10. Devices of Android and
iOS can access the OneDrive storage with the help of a map. OneDrive offers 5GB of storage space for
the users (Puthal et al., 2015).
Dropbox: This is a new technology of storage on cloud. The Dropbox can be used both personally and
professionally. The user has to do subscription for using the Dropbox. There is almost about 2GB of data
space.
It is better to avoid all the new cloud storage for the Royal College. The new cloud storage cannot be
trusted with the security of data (Pant, Prakash & Asthana, 2015). it is better to choose old mediums of
cloud storage.
Advantages of Cloud Storage:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4Summary Report
Affordable upgrades and free space.
Data can be stored in remote location. The data is accessible to the user from anywhere they like.
The transmission of data is done in a secured way.
Disadvantages of Cloud Storage:
There is a limitation of free storage (Chang & Ramachandran, 2016).
There always remains a risk of closing the storage space.
There must be access to internet for storing the files as backup.
Save Data to an External Hard Drive:
The external and the hard drives can be used for a backup storage. These external drives can be
connected from one system to another when needed. There are wired devices along with wireless
capabilities (Vijayakumar, 2016). There are many external drives and portable drives that mostly has an
advantage of being connected to computer devices of USB port 3.0.
Advantages of external devices:
The external devices are very easy to use.
The backups can be stored safely with the external devices.
Disadvantages of external devices:
There is always a failure risk of the hard drive that is being used.
The costs of the hard drives are very high with the increasing of capacity.
Should be kept safe from other catastrophe.
Burn it to a CD or a DVD, or Blu-ray Disc:
These storages are nowadays not so much popular but are still considered as storage of device
for keeping backup of data (Ramachandran & Chang, 2016). These storages are reliable for data storage
but is not considered as back dated.
Affordable upgrades and free space.
Data can be stored in remote location. The data is accessible to the user from anywhere they like.
The transmission of data is done in a secured way.
Disadvantages of Cloud Storage:
There is a limitation of free storage (Chang & Ramachandran, 2016).
There always remains a risk of closing the storage space.
There must be access to internet for storing the files as backup.
Save Data to an External Hard Drive:
The external and the hard drives can be used for a backup storage. These external drives can be
connected from one system to another when needed. There are wired devices along with wireless
capabilities (Vijayakumar, 2016). There are many external drives and portable drives that mostly has an
advantage of being connected to computer devices of USB port 3.0.
Advantages of external devices:
The external devices are very easy to use.
The backups can be stored safely with the external devices.
Disadvantages of external devices:
There is always a failure risk of the hard drive that is being used.
The costs of the hard drives are very high with the increasing of capacity.
Should be kept safe from other catastrophe.
Burn it to a CD or a DVD, or Blu-ray Disc:
These storages are nowadays not so much popular but are still considered as storage of device
for keeping backup of data (Ramachandran & Chang, 2016). These storages are reliable for data storage
but is not considered as back dated.

5Summary Report
Advantages of Burn Disc:
Failures of drives are not a problem here.
Can be stored safely in another location.
Disadvantages of Burning Disc:
This type of storage device is very time consuming. To copy data to a disc is time taking.
Privacy can be hampered in using these storage devices.
USB Flash Drive:
USB flash drives are basically small devices of storage that can be carried with the user
anywhere with any extra load. Flash drive were previously expensive but are now available very easily
with low price (Tan et al., 2014). The size of the flash drive has also increased.
Advantages of Flash Drive:
These drives are affordable.
Portable; that is can be carried to any place the user likes.
The drive is available in USB 3.0
Disadvantages of Flash Drive:
These drives can be easily misplaceable.
These are not durable.
There is a limitation of capacity in flash drive.
Save Data to a NAS Device:
NAS is a network-attached storage that is used as a server for saving data or storing data. The
NAS network can be either wireless or can be wired, which mainly depends on the system or the drive
(Rasheed, 2014). When configuration is done, it can be displayed to another system as well.
Advantages of NAS Drive:
Advantages of Burn Disc:
Failures of drives are not a problem here.
Can be stored safely in another location.
Disadvantages of Burning Disc:
This type of storage device is very time consuming. To copy data to a disc is time taking.
Privacy can be hampered in using these storage devices.
USB Flash Drive:
USB flash drives are basically small devices of storage that can be carried with the user
anywhere with any extra load. Flash drive were previously expensive but are now available very easily
with low price (Tan et al., 2014). The size of the flash drive has also increased.
Advantages of Flash Drive:
These drives are affordable.
Portable; that is can be carried to any place the user likes.
The drive is available in USB 3.0
Disadvantages of Flash Drive:
These drives can be easily misplaceable.
These are not durable.
There is a limitation of capacity in flash drive.
Save Data to a NAS Device:
NAS is a network-attached storage that is used as a server for saving data or storing data. The
NAS network can be either wireless or can be wired, which mainly depends on the system or the drive
(Rasheed, 2014). When configuration is done, it can be displayed to another system as well.
Advantages of NAS Drive:

6Summary Report
Several systems can be backed up by the NAS network at once.
The backup process can be done automatically in NAS network.
Disadvantages of NAS Drive:
These storages are very much costly.
There is a possibility of failure of the drive.
Federal notification for data storage
The government of U.S. has implemented many federal notifications that are related with the data
breach. There are many rules and regulations that are related with the data breach. There is a act known
as “Data Security and Breach Notification Act of 2015” for securing the data in an organization (Aradau &
Blanke, 2015). The data maintenance team of Royal Challenge needs to implement this act of data
protection for any further data breach that can take place in the system of the college. The government of
U.S. proposes several laws to keep the emails data safe. Other data that are related with the college are
the PDF, records of all meetings, videos, usage files from the internet, computer logs and many more.
The best way to store all those data is by implementing the cloud system to the network of Royal
Challenge. The Royal College should notify all their users if there is a possibility of data breach. Several
lawsuits are related to data breach (Tiwari & Joshi, 2016). Maximum of the data breach involves lawsuits
that has victims of data breach and also involves negligence related to the data protection. The lawsuits
of data breach also look after that the data breach that has taken place that the actual damage that is
caused by the data breach.
Several systems can be backed up by the NAS network at once.
The backup process can be done automatically in NAS network.
Disadvantages of NAS Drive:
These storages are very much costly.
There is a possibility of failure of the drive.
Federal notification for data storage
The government of U.S. has implemented many federal notifications that are related with the data
breach. There are many rules and regulations that are related with the data breach. There is a act known
as “Data Security and Breach Notification Act of 2015” for securing the data in an organization (Aradau &
Blanke, 2015). The data maintenance team of Royal Challenge needs to implement this act of data
protection for any further data breach that can take place in the system of the college. The government of
U.S. proposes several laws to keep the emails data safe. Other data that are related with the college are
the PDF, records of all meetings, videos, usage files from the internet, computer logs and many more.
The best way to store all those data is by implementing the cloud system to the network of Royal
Challenge. The Royal College should notify all their users if there is a possibility of data breach. Several
lawsuits are related to data breach (Tiwari & Joshi, 2016). Maximum of the data breach involves lawsuits
that has victims of data breach and also involves negligence related to the data protection. The lawsuits
of data breach also look after that the data breach that has taken place that the actual damage that is
caused by the data breach.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7Summary Report
References
Ali, M., Malik, S. U., & Khan, S. U. (2017). DaSCE: Data security for cloud environment with semi-trusted
third party. IEEE Transactions on cloud computing, 5(4), 642-655.
Aradau, C., & Blanke, T. (2015). The (Big) Data-security assemblage: Knowledge and critique. Big Data &
Society, 2(2), 2053951715609066.
Bertino, E. (2016, March). Data Security and Privacy in the IoT. In EDBT (Vol. 2016, pp. 1-3).
Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption
algorithms. International Journal of Security and Its Applications, 9(4), 289-306.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud computing
adoption framework. IEEE Transactions on Services Computing, 9(1), 138-151.
Pancholi, V. R., & Patel, B. P. (2016). Enhancement of cloud computing security with secure data storage
using AES. International Journal for Innovative Research in Science and Technology, 2(9), 18-21.
Pant, V. K., Prakash, J., & Asthana, A. (2015, October). Three step data security model for cloud
computing based on RSA and steganography. In Green Computing and Internet of Things
(ICGCIoT), 2015 International Conference on (pp. 490-494). IEEE.
Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015, November). A dynamic key length based approach
for real-time security verification of big sensing data stream. In International Conference on Web
Information Systems Engineering (pp. 93-108). Springer, Cham.
Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service providers for
cloud data security. International Journal of Information Management, 36(4), 618-625.
Rasheed, H. (2014). Data and infrastructure security auditing in cloud computing
environments. International Journal of Information Management, 34(3), 364-368.
References
Ali, M., Malik, S. U., & Khan, S. U. (2017). DaSCE: Data security for cloud environment with semi-trusted
third party. IEEE Transactions on cloud computing, 5(4), 642-655.
Aradau, C., & Blanke, T. (2015). The (Big) Data-security assemblage: Knowledge and critique. Big Data &
Society, 2(2), 2053951715609066.
Bertino, E. (2016, March). Data Security and Privacy in the IoT. In EDBT (Vol. 2016, pp. 1-3).
Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption
algorithms. International Journal of Security and Its Applications, 9(4), 289-306.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud computing
adoption framework. IEEE Transactions on Services Computing, 9(1), 138-151.
Pancholi, V. R., & Patel, B. P. (2016). Enhancement of cloud computing security with secure data storage
using AES. International Journal for Innovative Research in Science and Technology, 2(9), 18-21.
Pant, V. K., Prakash, J., & Asthana, A. (2015, October). Three step data security model for cloud
computing based on RSA and steganography. In Green Computing and Internet of Things
(ICGCIoT), 2015 International Conference on (pp. 490-494). IEEE.
Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015, November). A dynamic key length based approach
for real-time security verification of big sensing data stream. In International Conference on Web
Information Systems Engineering (pp. 93-108). Springer, Cham.
Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service providers for
cloud data security. International Journal of Information Management, 36(4), 618-625.
Rasheed, H. (2014). Data and infrastructure security auditing in cloud computing
environments. International Journal of Information Management, 34(3), 364-368.

8Summary Report
Shaikh, R., & Sasikumar, M. (2015). Data Classification for achieving Security in cloud
computing. Procedia computer science, 45, 493-498.
Sharif, A., Cooney, S., Gong, S., & Vitek, D. (2015, October). Current security threats and prevention
measures relating to cloud services, Hadoop concurrent processing, and big data. In Big Data
(Big Data), 2015 IEEE International Conference on(pp. 1865-1870). IEEE.
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014). Enhancing big data
security with collaborative intrusion detection. IEEE cloud computing, 1(3), 27-33.
Tiwari, P. K., & Joshi, S. (2016). Data security for software as a service. In Web-Based Services:
Concepts, Methodologies, Tools, and Applications (pp. 864-880). IGI Global.
Vijayakumar, V. (2016). Big data security framework for distributed cloud data centers. Cybersecurity
breaches and issues surrounding online threat protection, 288.
Zhang, Y., Chen, X., Li, J., Wong, D. S., Li, H., & You, I. (2017). Ensuring attribute privacy protection and
fast decryption for outsourced data security in mobile cloud computing. Information
Sciences, 379, 42-61.
Shaikh, R., & Sasikumar, M. (2015). Data Classification for achieving Security in cloud
computing. Procedia computer science, 45, 493-498.
Sharif, A., Cooney, S., Gong, S., & Vitek, D. (2015, October). Current security threats and prevention
measures relating to cloud services, Hadoop concurrent processing, and big data. In Big Data
(Big Data), 2015 IEEE International Conference on(pp. 1865-1870). IEEE.
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014). Enhancing big data
security with collaborative intrusion detection. IEEE cloud computing, 1(3), 27-33.
Tiwari, P. K., & Joshi, S. (2016). Data security for software as a service. In Web-Based Services:
Concepts, Methodologies, Tools, and Applications (pp. 864-880). IGI Global.
Vijayakumar, V. (2016). Big data security framework for distributed cloud data centers. Cybersecurity
breaches and issues surrounding online threat protection, 288.
Zhang, Y., Chen, X., Li, J., Wong, D. S., Li, H., & You, I. (2017). Ensuring attribute privacy protection and
fast decryption for outsourced data security in mobile cloud computing. Information
Sciences, 379, 42-61.
1 out of 9

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.