[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Alqahtani, 2019 - Google Patents

A novel approach to providing secure data storage using multi cloud computing

Alqahtani, 2019

View PDF
Document ID
4033372704712874983
Author
Alqahtani H
Publication year

External Links

Snippet

The cloud computing is a new technology that has been presented in the market un recent years. However, it suffered several security breaches, and has some open issues, in terms of security. Due to that, the literature was investigated to highlight the cloud computing security …
Continue reading at uobrep.openrepository.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • G06F15/163Interprocessor communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance

Similar Documents

Publication Publication Date Title
Chadwick et al. A cloud-edge based data security architecture for sharing and analysing cyber threat information
Singh et al. Cloud security issues and challenges: A survey
AlAhmad et al. Mobile cloud computing models security issues: A systematic review
Zawoad et al. Cloud Forensics
Kalloniatis et al. Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
Akhtar et al. A comprehensive overview of privacy and data security for cloud storage
Gul et al. Cloud computing security auditing
Soares et al. Cloud security: state of the art
Gurkok Securing cloud computing systems
Caballero Information security essentials for information technology managers: Protecting mission-critical systems
Chandramouli et al. Security guidelines for storage infrastructure
Bulusu et al. A study on cloud computing security challenges
Mehak et al. Security aspects of database-as-a-service (DBaaS) in cloud computing
James et al. Digital forensic investigation and cloud computing
Morrow et al. Cloud security best practices derived from mission thread analysis
Ahmed Ki-Ngā-Kōpuku: a decentralised, distributed security model for cloud computing
Alqahtani A novel approach to providing secure data storage using multi cloud computing
Deshpande et al. Optimization of security as an enabler for cloud services and applications
Mandal et al. Comprehensive Survey of Security Issues & Framework in Data-Centric Cloud Applications.
Yadav et al. A comprehensive survey of IoT-based cloud computing cyber security
Hon et al. Cloud Computing Demystified (Part 2): Control, Security, and Risk in the Cloud
Sailakshmi Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud
De Marco et al. Digital evidence management, presentation, and court preparation in the cloud: a forensic readiness approach
Sibiya Digital forensic model for a cloud environment
Kolhar et al. Cloud Computing Data Auditing Algorithm