Mechanisms for protecting sensitive information in cloud computing

Tomer Gershoni, Miranda Mowbray, Siani Pearson

Research output: Contribution to journalArticle (Academic Journal)peer-review

2 Citations (Scopus)


In this paper a variety of approaches are presented and assessed that may be used to protect personal and business confidential information within the cloud. Some of these approaches are available for use now; others are relatively immature, but are being currently researched and improved, and look promising for future use. The most appropriate approach varies according to the context and stakeholder requirements and in particular the type of data to be processed or application to be run in the cloud.

Original languageEnglish
Pages (from-to)357-376
Number of pages20
JournalComputer Systems Science and Engineering
Issue number6
Publication statusPublished - 2013


  • Cloud computing
  • Encryption
  • Hybrid cloud
  • Privacy
  • Security
  • Technology
  • Trusted computing
  • Virtual private cloud


Dive into the research topics of 'Mechanisms for protecting sensitive information in cloud computing'. Together they form a unique fingerprint.

Cite this