2 research outputs found

    A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing

    Get PDF
    Cloud computing (CC) is among the most rapidly evolving computer technologies. That is the required accessibility of network assets, mainly information storage with processing authority without the requirement for particular and direct user administration. CC is a collection of public and private data centers that provide a single platform for clients throughout the Internet. The growing volume of personal and sensitive information acquired through supervisory authorities demands the usage of the cloud not just for information storage and for data processing at cloud assets. Nevertheless, due to safety issues raised by recent data leaks, it is recommended that unprotected sensitive data not be sent to public clouds. This document provides a detailed appraisal of the research regarding data protection and privacy problems, data encrypting, and data obfuscation, including remedies for cloud data storage. The most up-to-date technologies and approaches for cloud data security are examined. This research also examines several current strategies for addressing cloud security concerns. The performance of each approach is then compared based on its characteristics, benefits, and shortcomings. Finally, go at a few active cloud storage data security study fields

    Data Migration in the Era of Digital Transformation: Migrating to Cloud-Based Solutions

    Get PDF
    Internship Report presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business IntelligenceThis internship report provides an overview of data migration, a crucial process in modern organisations' digital transformation efforts. It explores the importance of data migration for optimising data management strategies and gaining a competitive edge. The report discusses the steps of data migration, including planning, data extraction, transformation, loading, validation and reconciliation. It addresses common challenges such as data mapping complexities and system compatibility issues, and suggests strategies to mitigate risks. Additionally, the report highlights the importance of data security and privacy considerations during data migration, including compliance with regulations and the adoption of encryption and access controls. It contains best practices and recommendations for successful data migration projects, stressing collaboration, monitoring, and evaluation for accurate and stable data migration outcomes
    corecore