Agrawal et al., 2018 - Google Patents
Access control framework using dynamic attributes encryption for mobile cloud environmentAgrawal et al., 2018
- Document ID
- 4636281916372724005
- Author
- Agrawal N
- Tapaswi S
- Publication year
- Publication venue
- Progress in Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2016, Volume 1
External Links
Snippet
Unified communication allows the users to share data between multiple devices having different platform. Previously, data was stored on local servers and accessed by employees through their desktops that have security policies inbuilt. In the age of integrated …
- 238000004891 communication 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | A lightweight secure data sharing scheme for mobile cloud computing | |
Pradeep et al. | An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment | |
He et al. | Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems | |
Tassanaviboon et al. | Oauth and abe based authorization in semi-trusted cloud computing: aauth | |
Agrawal et al. | A trustworthy agent-based encrypted access control method for mobile cloud computing environment | |
Murugesan et al. | Analysis on homomorphic technique for data security in fog computing | |
Rana et al. | Efficient and secure attribute based access control architecture for smart healthcare | |
Yan et al. | Controlling cloud data access based on reputation | |
Tu et al. | A secure, efficient and verifiable multimedia data sharing scheme in fog networking system | |
Kotha et al. | A comprehensive review on secure data sharing in cloud environment | |
Velumadhava Rao et al. | Hierarchical group key management for secure data sharing in a cloud‐based environment | |
Lee et al. | Time‐bound key‐aggregate encryption for cloud storage | |
Eltayieb et al. | ASDS: Attribute‐based secure data sharing scheme for reliable cloud environment | |
Gowda et al. | TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments | |
Yan et al. | Heterogeneous data access control based on trust and reputation in mobile cloud computing | |
Agrawal et al. | Access control framework using dynamic attributes encryption for mobile cloud environment | |
Pervez et al. | Oblivious access control policies for cloud based data sharing systems | |
Alshehri et al. | An encryption-based approach to protect fog federations from rogue nodes | |
Karati et al. | Federated secure data sharing by edge-cloud computing model | |
Tian et al. | Cloud data assured deletion scheme based on dynamic sliding window | |
Idrissi et al. | Security of mobile agent platforms using access control and cryptography | |
Routray et al. | Context-Aware Attribute Based Access Control for Cloud-based SCADA Systems | |
Fotiou et al. | Rendezvous‐based access control for information‐centric architectures | |
Zhang et al. | Privacy protection of social networks based on classified attribute encryption | |
Mahmoud et al. | A robust cryptographic‐based system for secure data sharing in cloud environments |