Authors :
Nwankwo, U. C; Ugochukwu, E.C; Nwaeze, A.S; Ugwu, E. C; Abundance, M. A; Eze, H.O; Ozuomba U.C; Amadi, E.G; Ngene, N.J
Volume/Issue :
Volume 8 - 2023, Issue 8 - August
Google Scholar :
https://bit.ly/3TmGbDi
Scribd :
https://tinyurl.com/5cezbcws
DOI :
https://doi.org/10.5281/zenodo.8337688
Abstract :
The major concerns that keep most
organizations away from cloud computing are Security
and information authenticity. People are wary about
providing confidential information to unauthorized
parties. Individuals or hackers may intercept and modify
electronic documents. Using a password to encrypt data
is risky because hackers can gain access to it and exploit
it to steal data. As a result, this research provides a
solution by building a model for protecting data in the
cloud via a layered approach. To implement these
concepts, a web system developed with PHP and MySQL
was employed. The OODM technique was used for
components in the system modules, allowing for easy
coupling, decoupling, modification, encapsulation, and
reuse, as well as easy maintainability. When compared to
the previous system, which depended simply on
passwords for authentication, the new technique
developed produces a high level of data security.
Keywords :
Data protection, Cloud computing, layered approach.
The major concerns that keep most
organizations away from cloud computing are Security
and information authenticity. People are wary about
providing confidential information to unauthorized
parties. Individuals or hackers may intercept and modify
electronic documents. Using a password to encrypt data
is risky because hackers can gain access to it and exploit
it to steal data. As a result, this research provides a
solution by building a model for protecting data in the
cloud via a layered approach. To implement these
concepts, a web system developed with PHP and MySQL
was employed. The OODM technique was used for
components in the system modules, allowing for easy
coupling, decoupling, modification, encapsulation, and
reuse, as well as easy maintainability. When compared to
the previous system, which depended simply on
passwords for authentication, the new technique
developed produces a high level of data security.
Keywords :
Data protection, Cloud computing, layered approach.