EconPapers    
Economics at your fingertips  
 

Data Security Methods in Cloud Computing

Lidia Maria Bruma ()

Informatica Economica, 2020, vol. 24, issue 1, 48-60

Abstract: Digital technology has become an important part of organizations due to the global spread of the internet and the increase in the number of smart devices, offering multiple benefits to users. The need for adapting to current requirements, has led to emergence of a new technology, cloud computing, developed for modern people needs, addicted to information and on the run. Information security is one of the main challenges for cloud developers, data loss causing damage in various fields and this is one of the reasons why some organizations do not adopt cloud migration. This paper analyzes the security of cloud computer technology, as well as the issues to ensure the security of the data in the cloud, according to the current technological methods and the specific architecture. The final part of the paper proposes a customized method for data security according to their importance to a particular organization, using current security methods.

Keywords: Cloud Computing; Data Security; Security Methods; Data Life Cycle; Data Classification (search for similar items in EconPapers)
Date: 2020
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://revistaie.ase.ro/content/93/05%20-%20bruma.pdf (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aes:infoec:v:24:y:2020:i:1:p:48-60

Access Statistics for this article

Informatica Economica is currently edited by Ion Ivan

More articles in Informatica Economica from Academy of Economic Studies - Bucharest, Romania Contact information at EDIRC.
Bibliographic data for series maintained by Paul Pocatilu ().

 
Page updated 2025-03-19
Handle: RePEc:aes:infoec:v:24:y:2020:i:1:p:48-60