Different Methods of Distribution Data in the Cloud - Controlled by IT Security Specialist
No Thumbnail Available
Date
2025-07-17
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
AAB College
Abstract
In spite of the fact that there is an increase in the usage of cloud storage services, there is still a significant number of client organizations that lack sufficient trust in third party cloud providers. To improve the privacy of users and to ensure more secured data we have proposed a model for security in cloud computing, in the previous work [1]. Part of our proposed model is IT Security Specialist (ITSS) of the company i.e. that will control security in cloud computing. This solution is based on some ways of file encryption, partitioning, and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. In this paper we propose two new methods as part of our proposed model [1,2]. Based on the results of this work, we provide the comments in relations to the methods as a part of the proposed model of security in the cloud computing
Description
Ky studim propozon metoda të shpërndarjes dhe enkriptimit të të dhënave në cloud, të kontrolluara nga specialistë të sigurisë IT, për të rritur privatësinë dhe sigurinë e përdoruesve
Keywords
ITSS-IT Security Specialist, Partitioning, Confidentiality, Cloud Service Provider, Platform as a Service, Cloud Security, Virtual Machine (VM)
Citation
Hyseni, D., Luma, A., Selimi, B., Cico, B., & Shemsedini, E. (2018, June). Different methods of distribution data in the cloud - Controlled by IT Security Specialist