[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Agrawal et al., 2018 - Google Patents

Access control framework using dynamic attributes encryption for mobile cloud environment

Agrawal et al., 2018

Document ID
4636281916372724005
Author
Agrawal N
Tapaswi S
Publication year
Publication venue
Progress in Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2016, Volume 1

External Links

Snippet

Unified communication allows the users to share data between multiple devices having different platform. Previously, data was stored on local servers and accessed by employees through their desktops that have security policies inbuilt. In the age of integrated …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Similar Documents

Publication Publication Date Title
Li et al. A lightweight secure data sharing scheme for mobile cloud computing
Pradeep et al. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
He et al. Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems
Tassanaviboon et al. Oauth and abe based authorization in semi-trusted cloud computing: aauth
Agrawal et al. A trustworthy agent-based encrypted access control method for mobile cloud computing environment
Murugesan et al. Analysis on homomorphic technique for data security in fog computing
Rana et al. Efficient and secure attribute based access control architecture for smart healthcare
Yan et al. Controlling cloud data access based on reputation
Tu et al. A secure, efficient and verifiable multimedia data sharing scheme in fog networking system
Kotha et al. A comprehensive review on secure data sharing in cloud environment
Velumadhava Rao et al. Hierarchical group key management for secure data sharing in a cloud‐based environment
Lee et al. Time‐bound key‐aggregate encryption for cloud storage
Eltayieb et al. ASDS: Attribute‐based secure data sharing scheme for reliable cloud environment
Gowda et al. TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments
Yan et al. Heterogeneous data access control based on trust and reputation in mobile cloud computing
Agrawal et al. Access control framework using dynamic attributes encryption for mobile cloud environment
Pervez et al. Oblivious access control policies for cloud based data sharing systems
Alshehri et al. An encryption-based approach to protect fog federations from rogue nodes
Karati et al. Federated secure data sharing by edge-cloud computing model
Tian et al. Cloud data assured deletion scheme based on dynamic sliding window
Idrissi et al. Security of mobile agent platforms using access control and cryptography
Routray et al. Context-Aware Attribute Based Access Control for Cloud-based SCADA Systems
Fotiou et al. Rendezvous‐based access control for information‐centric architectures
Zhang et al. Privacy protection of social networks based on classified attribute encryption
Mahmoud et al. A robust cryptographic‐based system for secure data sharing in cloud environments