[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Parab et al., 2017 - Google Patents

Cloud based secure banking application

Parab et al., 2017

Document ID
5779306549894224627
Author
Parab N
Colaco L
Coutinho F
Publication year
Publication venue
2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)

External Links

Snippet

Individual Banks store vast amounts of user sensitive data on their private server. Sharing this data with other banks will provide an efficient way of offering their customers with personalized services and will deliver value-added data services to the entire banking …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
US20220014367A1 (en) Decentralized computing systems and methods for performing actions using stored private data
JP6925686B1 (en) Information processing system, information processing device, information processing method, and information processing program
WO2021014733A1 (en) Computation device, computation method, computation program, and computation system
Khan et al. SSM: Secure-Split-Merge data distribution in cloud infrastructure
US20210067334A1 (en) System and Method for Cryptographic Key Fragments Management
KR20210143846A (en) encryption systems
Igarramen et al. FADETPM: Novel approach of file assured deletion based on trusted platform module
KR20210058313A (en) Data access control method and system using attribute-based password for secure and efficient data sharing in cloud environment
Ahammad et al. Key based secured cryptosystems used for online data sharing on the cloud
US20210194694A1 (en) Data processing system
Suthar et al. EncryScation: A novel framework for cloud iaas, daas security using encryption and obfuscation techniques
US11436351B1 (en) Homomorphic encryption of secure data
Parab et al. Cloud based secure banking application
US11997191B2 (en) System and method for protecting secret data items using multiple tiers of encryption and secure element
Xie et al. Assured Deletion: A Scheme Based on Strong Nonseparability
Fernandez et al. Securing Blockchain with Quantum Safe Cryptography: When and How?
Mishra et al. A survey on load balancing in cloud computing
Raja et al. An enhanced study on cloud data services using security technologies
Gagged et al. Improved secure dynamic bit standard technique for a private cloud platform to address security challenges
Reddy et al. Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques
Jayasarathi et al. Enhanced on Data Encryption Standard for Secured Cloud Storage
Akinboro et al. Privacy enforcement on subscribers data in cloud computing
Nithisha et al. A Secured Data Storage Mechanism Using Baye’s Theorem and Matrix for Effective Data Communication in Cloud
Baby et al. COBBS: a multicloud architecture for better business solutions
Neela DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract‐Based Access Control, and Hash Authentication Codes for Cloud Security