EMERGING TRENDS IN SOFTWARE ENGINEERING
CLOUD COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Access control
|
|
Auditing
|
|
Authentication
|
|
All of them
|
Detailed explanation-1: -When it comes to data protection in the cloud, authentication, identity, access control, encryption, secure deletion, integrity checking, and data masking are all the techniques applicable to cloud computing.
Detailed explanation-2: -Authorization is used to control the access of data. It is the mechanism by which a system determines what level of access a particular authenticated user should have to secure resources controlled by the system. Data integrity in the cloud system means preserving information integrity.
Detailed explanation-3: -Data protection is the process of protecting sensitive information from damage, loss, or corruption. As the amount of data being created and stored has increased at an unprecedented rate, making data protection increasingly important.