Alqahtani, 2019 - Google Patents
A novel approach to providing secure data storage using multi cloud computingAlqahtani, 2019
View PDF- Document ID
- 4033372704712874983
- Author
- Alqahtani H
- Publication year
External Links
Snippet
The cloud computing is a new technology that has been presented in the market un recent years. However, it suffered several security breaches, and has some open issues, in terms of security. Due to that, the literature was investigated to highlight the cloud computing security …
- 238000003860 storage 0 title abstract description 115
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chadwick et al. | A cloud-edge based data security architecture for sharing and analysing cyber threat information | |
Singh et al. | Cloud security issues and challenges: A survey | |
AlAhmad et al. | Mobile cloud computing models security issues: A systematic review | |
Zawoad et al. | Cloud Forensics | |
Kalloniatis et al. | Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts | |
Akhtar et al. | A comprehensive overview of privacy and data security for cloud storage | |
Gul et al. | Cloud computing security auditing | |
Soares et al. | Cloud security: state of the art | |
Gurkok | Securing cloud computing systems | |
Caballero | Information security essentials for information technology managers: Protecting mission-critical systems | |
Chandramouli et al. | Security guidelines for storage infrastructure | |
Bulusu et al. | A study on cloud computing security challenges | |
Mehak et al. | Security aspects of database-as-a-service (DBaaS) in cloud computing | |
James et al. | Digital forensic investigation and cloud computing | |
Morrow et al. | Cloud security best practices derived from mission thread analysis | |
Ahmed | Ki-Ngā-Kōpuku: a decentralised, distributed security model for cloud computing | |
Alqahtani | A novel approach to providing secure data storage using multi cloud computing | |
Deshpande et al. | Optimization of security as an enabler for cloud services and applications | |
Mandal et al. | Comprehensive Survey of Security Issues & Framework in Data-Centric Cloud Applications. | |
Yadav et al. | A comprehensive survey of IoT-based cloud computing cyber security | |
Hon et al. | Cloud Computing Demystified (Part 2): Control, Security, and Risk in the Cloud | |
Sailakshmi | Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud | |
De Marco et al. | Digital evidence management, presentation, and court preparation in the cloud: a forensic readiness approach | |
Sibiya | Digital forensic model for a cloud environment | |
Kolhar et al. | Cloud Computing Data Auditing Algorithm |