Rawat et al., 2012 - Google Patents
A survey of various techniques to secure cloud storageRawat et al., 2012
View PDF- Document ID
- 6261022387752639572
- Author
- Rawat S
- Sharma N
- Publication year
- Publication venue
- International Journal of Computer Science and Network Security
External Links
Snippet
When it comes to cloud data protection methods, no particularly new technique is required. Protecting data in the cloud can be similar to protecting data within a traditional data center. Authentication and identity, access control, encryption, secure deletion, integrity checking …
- 238000000034 method 0 title abstract description 19
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10673626B2 (en) | Threshold secret share authentication proof and secure blockchain voting with hardware security modules | |
Kaaniche et al. | Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms | |
Thilakanathan et al. | Secure data sharing in the cloud | |
US20040022390A1 (en) | System and method for data protection and secure sharing of information over a computer network | |
US20090271627A1 (en) | Secure Data Transmission | |
Huang et al. | A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud | |
Sugumaran et al. | An architecture for data security in cloud computing | |
JP2012518330A (en) | Reliable cloud computing and cloud service framework | |
Jakóbik | Big data security | |
US8707034B1 (en) | Method and system for using remote headers to secure electronic files | |
Rawat et al. | A survey of various techniques to secure cloud storage | |
Murray et al. | Cloud service security & application vulnerability | |
Yu et al. | Data security in cloud computing | |
US20080044023A1 (en) | Secure Data Transmission | |
Abdul-Jabbar et al. | State-of-the-art in data integrity and privacy-preserving in cloud computing | |
CN109302400B (en) | Asset password exporting method for operation and maintenance auditing system | |
Purushothama et al. | Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud | |
Suma et al. | Blockchain usage in the electronic health record system using attribute-based signature | |
Verma et al. | Applications of Data Security and Blockchain in Smart City Identity Management | |
US10892892B1 (en) | Method and apparatus for end-to-end secure sharing of information with multiple recipients without maintaining a key directory | |
Dahshan | Data security in cloud storage services | |
Sabitha et al. | Anonymous-cpabe: Privacy preserved content disclosure for data sharing in cloud | |
Kathrine et al. | Four-factor based privacy preserving biometric authentication and authorization scheme for enhancing grid security | |
Verma et al. | A hybrid two layer attribute based encryption for privacy preserving in public cloud | |
Batten et al. | Prevention of information harvesting in a cloud services environment |