web applications and protect them from becoming vectors of attacks, and how to control
access of cloud platforms by users across the globe.
4. Expected results
Despite modern techniques meant to protect end user data in cloud platforms, there is still
a possibility that cloud services or applications may be hacked. To maximize cloud
storage security, it is advisable to combine various data protection approaches or
strategies. Hardening data protection using multiple techniques rather than just
encryption is important when considering powerful attacks meant to steal or destroy
private user data.
5. References
Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud
computing. In Computer Science and Electronics Engineering (ICCSEE), 2012
International Conference on (Vol. 1, pp. 647-651). IEEE.
Zhang, X., Du, H. T., Chen, J. Q., Lin, Y., & Zeng, L. J. (2011, May). Ensure data
security in cloud storage. In Network Computing and Information Security
(NCIS), 2011 International Conference on (Vol. 1, pp. 284-287). IEEE.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud
computing using encryption algorithms. International journal of engineering
research and applications, 3(4), 1922-1926.