首页> 外文期刊>信息安全(英文) >Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1)
【24h】

Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1)

机译:数据迁移需要,策略,挑战,方法,类别,风险,云计算的用途,以及使用建议的提出模型使用云的改进(DMIG 1)

获取原文
获取原文并翻译 | 示例
       

摘要

Data Migration is a multi-step process that begins with analyzing old data and culminates in data uploading and reconciliation in new applications. With the rapid growth of data, organizations constantly need to migrate data. Data migration can be a complex process as testing must be done to ensure data quality. Migration also can be very costly if best practices are not followed and hidden costs are not identified in the early stage. On the other hand, many organizations today instead of buying IT equipment (hardware and/or software) and managing it themselves, they prefer to buy services from IT service providers. The number of service providers is increasing dramatically and the cloud is becoming the preferred tool for more cloud storage services. However, as more information and personal data are transferred to the cloud, to social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. So, academia and industry circles strive to find an effective way to secure data migration in the cloud. Various resolving methods and encryption techniques have been implemented. In this work, we will try to cover many important points in data migration as Strategy, Challenges, Need, methodology, Categories, Risks, and Uses with Cloud computing. Finally, we discuss data migration security and privacy challenge and how to solve this problem by making improvements in it’s using with Cloud through suggested proposed model that enhances data security and privacy by gathering Advanced Encryption Standard-256 (ATS256), Data Dispersion Algorithms and Secure Hash Algorithm-512. This model achieves verifiable security ratings and fast execution times.
机译:数据迁移是一个多步骤过程,首先分析旧数据,并在新应用程序中的数据上载和对帐中达到了高潮。随着数据的快速增长,组织不断需要迁移数据。数据迁移可以是一个复杂的过程,因为必须进行测试以确保数据质量。如果未遵循最佳实践,并且在早期未遵守最佳实践,则迁移也可能是非常昂贵的。另一方面,今天许多组织代替购买IT设备(硬件和/或软件)并自己管理它,他们更愿意从IT服务提供商购买服务。服务提供商的数量急剧增加,云正在成为更多云存储服务的首选工具。但是,随着更多信息和个人数据被转移到云端,向社交媒体网站,Dropbox,Baidu Wangpan等,数据安全和隐私问题受到质疑。因此,学术界和工业界致力于找到一种有效的方法来保护云中的数据迁移。已经实施了各种解答方法和加密技术。在这项工作中,我们将尝试涵盖数据迁移中的许多重要点作为云计算的战略,挑战,需要,方法,类别,风险和用途。最后,我们讨论数据迁移安全和隐私挑战,如何通过通过建议的提出的建议模型来改进它通过使用云进行改进来通过提高数据安全性和隐私,通过收集高级加密标准-256(ATS256),数据色散算法和安全来解决这个问题哈希算法-512。该模型可实现可验证的安全评级和快速执行时间。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号