Affiliation:
1. Islamic University in Uganda, Uganda
2. Kampala International University, Uganda
Abstract
Data privacy is an intricate job and is becoming a key area of research as far as cloud technologies are concerned. This is because the information is massively generated from many sources. It's collected, shared, and disseminated in many different segments. Due to this factor, countless individuals or organizations have absconded the cloud services despite the fact of their endless fruitiness benefits. Providing security to this data is a major concern. There are numerous ways this data can be protected from unauthorized users. Hence, data security and privacy are becoming very important fields of research for the future development and improvement of cloud technologies for the government, business, and industry. Data privacy protection issues are relevant to both hardware and software in the cloud architecture. Therefore, this study will review different data privacy concepts, data access protection methods, approaches to manage data privacy, data privacy techniques, challenges faced during data access, and some research trends in data privacy.
Reference62 articles.
1. A comparative survey on symmetric key encryption techniques.;M.Agrawal;International Journal on Computer Science and Engineering,2012
2. An overview of electronic personal health records
3. Bieker, F., Friedewald, M., Hansen, M., Obersteller, H., & Rost, M. (2016). A process for data protection impact assessment under the European general data protection regulation. Annual Privacy Forum, 21–37.
4. Protecting Information with Cybersecurity
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献