Data at rest and it’s security solutions-A survey

Main Article Content

Farheen siddiqui
Ghazala Matloob

Abstract

Security of the data is the major challenge for every organization and to secure the archived data or you can say the data at rest is critical because this may consist of some of the confidential information which can be used in future. So , in this paper I tried to discuss the data at rest with it’s possible security solutions.
Keywords—Data at rest , data in transit , security, encryption , biometric, content address storage

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

REFRENCES

A white paper on “the digital universe in 2020†by John Gantz and David Reinsel.

A white paper on the “data loss prevention:data – at- rest vs data-at- motionâ€by identity finder

â€Asurvey on cloud data storage security techniques “Indian Journal of Reseach in Pharmacy and Biotechnology by S.vanimounika

A white paper on the “Approaches for encryption of data at rest in entreprise†by EMC.

â€Information and storage management†book by EMC

“A research survey on cloud computing security issues and it’s possible solutionsâ€International Journal of Advance Research in Computer Science by Gazala Matlloob

A white paper on†Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security†by Oracle

A white paper on â€Encryption data at rest†by Amazon web services.

A press release about volumetric “Vormetric is the Data-at-Rest security solution available in IBM Cloud Marketplaceâ€.

A white paper on†How Google Uses Encryption to Protect Your Data†by Google

A white paper on†Google for Work Security and Compliance Whitepaper†by Google

A white paper on†Securing Data at Rest: Database Encryption Solution using Empress Embedded Database†by Empress software Inc.

A blog on " Best practices: Securing data at rest and data at motion†by Andrea Raglione.

A white paper on†Protect Your Company’s Data with Efficient Encryption and Secure Remote Management â€by Intel

A blog on “History of data breaches “by Nate Lordâ€