Different Methods of Distribution Data in the Cloud - Controlled by IT Security Specialist

No Thumbnail Available

Date

2025-07-17

Journal Title

Journal ISSN

Volume Title

Publisher

AAB College

Abstract

In spite of the fact that there is an increase in the usage of cloud storage services, there is still a significant number of client organizations that lack sufficient trust in third party cloud providers. To improve the privacy of users and to ensure more secured data we have proposed a model for security in cloud computing, in the previous work [1]. Part of our proposed model is IT Security Specialist (ITSS) of the company i.e. that will control security in cloud computing. This solution is based on some ways of file encryption, partitioning, and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. In this paper we propose two new methods as part of our proposed model [1,2]. Based on the results of this work, we provide the comments in relations to the methods as a part of the proposed model of security in the cloud computing

Description

Ky studim propozon metoda të shpërndarjes dhe enkriptimit të të dhënave në cloud, të kontrolluara nga specialistë të sigurisë IT, për të rritur privatësinë dhe sigurinë e përdoruesve

Keywords

ITSS-IT Security Specialist, Partitioning, Confidentiality, Cloud Service Provider, Platform as a Service, Cloud Security, Virtual Machine (VM)

Citation

Hyseni, D., Luma, A., Selimi, B., Cico, B., & Shemsedini, E. (2018, June). Different methods of distribution data in the cloud - Controlled by IT Security Specialist

Collections

Endorsement

Review

Supplemented By

Referenced By