Ensuring Data Governace and Enhancing Data Security in a Private Cloud Environment

this paper proposes a new system of ensuring data governance and enhancing data security in private cloud environment. Security and Privacy concerns have been the major drawbacks in cloud computing environments. Security, reliability and privacy enhance users' flexibility in file accessibility....

Full description

Saved in:
Bibliographic Details
Published in2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) pp. 1018 - 1024
Main Authors Monday, Happy N., Ukwuoma, Chiagoziem C., Li, Jian P., Agomuo, David, Nneji, Grace U., Nneji, Richard I.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.11.2018
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:this paper proposes a new system of ensuring data governance and enhancing data security in private cloud environment. Security and Privacy concerns have been the major drawbacks in cloud computing environments. Security, reliability and privacy enhance users' flexibility in file accessibility. As easy-to-use cloud services penetrate personal computing, users expect to enjoy the same conveniences they have at home in the office. This paper proposes a workable security technique in a cloud computing environment that delivers Infrastructure as a Service (SaaS), and deployed in a Private Cloud to protect data and information stored and shared from potential intrusion, threats, theft, virus, and agents. This paper proposes a system that focuses on data encryption and CAPTCHA methods as regards to security solutions. This paper adopted the Structured Systems Analysis and Design Method (SSADM) for the development, and implementation of the new system. Java play framework is adopted for the implementation of the web based system. The database structure is handled be employing MySQL. The system was implemented and tested using the various test cases which were successful. The test result shows that the proposed method is efficient in data confidentiality, integrity and availability.
DOI:10.1109/IEMCON.2018.8615066