Abstract: When it comes to cloud data protection methods, no particularly new technique is required. Protecting data in the cloud can be similar to protecting data within a traditional data centre. Authentication and identity, access control, encryption, secure deletion, integrity checking, and data masking are all data protection methods that have applicability in cloud computing. This paper will briefly review few methods and will note anything that is particularly unique to when these are deployed in a cloud.
Keywords: Protecting data, control, encryption, secure deletion, integrity checking, and data