Abstract

Sensitive data has become an essential part of life today. With the increase in sensitive data, the importance of maintaining its confidentiality and integrity has increased. One of the solutions became to store this data in the cloud. But the risk of revealing this data still exists. This is because the rate of attack, leakage and loss of this data has become a serious matter. The importance of sensitive data in our current era is considered our oil, as it is very important in several uses in statistical analyzes and other important matters that help the authorities to know the type of people and their interests, and when publishing this information it is important to know what information should be available and What information should not appear or be used on the sites. In this paper, discuss this issue, which is one of the most important security issues that is sensitive data exposure. We touched on this research and the techniques used to reduce these risks to the data stored in the cloud. Mention the types of sensitive data and the types of attacks that may affect these data, and mention the points of weakness, and then the methods of protecting this data.

Highlights

  • Disclosure of sensitive data in storage, transmission, and permanent use in many locations poses a major risk to users’ privacy

  • Detected data: This technology has been tested against multiple attacks, and the results show that it is resistant to the main attack associated with cipher text and plain text attacks

  • Security of sensitive data has become an important matter with the development of technology and its remarkable progress, and all transactions are made via the internet, and the information must carry correct values to be dealt with in government agencies and official agencies in the provision of electronic services

Read more

Summary

Introduction

Disclosure of sensitive data in storage, transmission, and permanent use in many locations poses a major risk to users’ privacy. Internet requires new methods of data protection, especially sensitive data. Sensitive data can be any information that is needed to be secured from unauthorized access. Sensitive data can be banking information, Social Security numbers, and login credentials. Many papers discuss preserving information and ways to protect it. The rest of this paper is organized as follows; Section II, literature review, issues related to sensitive data are discussed. Data protection techniques concludes this paper discussing the possible methods and types of data protection. Reduce the risks in attacking this type of data in the framework of the cloud

Literature review
Sensitive data discussion’s
Overview of sensitive data
Sensitive data types
Sensitive data attacks
Vulnerabilities and problems facing data protection
Data breaches in cloud computing
Data protection techniques
Data splitting techniques
Data anonymization methods
Cryptographic techniques
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.