[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rawat et al., 2012 - Google Patents

A survey of various techniques to secure cloud storage

Rawat et al., 2012

View PDF
Document ID
6261022387752639572
Author
Rawat S
Sharma N
Publication year
Publication venue
International Journal of Computer Science and Network Security

External Links

Snippet

When it comes to cloud data protection methods, no particularly new technique is required. Protecting data in the cloud can be similar to protecting data within a traditional data center. Authentication and identity, access control, encryption, secure deletion, integrity checking …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US10673626B2 (en) Threshold secret share authentication proof and secure blockchain voting with hardware security modules
Kaaniche et al. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
Thilakanathan et al. Secure data sharing in the cloud
US20040022390A1 (en) System and method for data protection and secure sharing of information over a computer network
US20090271627A1 (en) Secure Data Transmission
Huang et al. A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud
Sugumaran et al. An architecture for data security in cloud computing
JP2012518330A (en) Reliable cloud computing and cloud service framework
Jakóbik Big data security
US8707034B1 (en) Method and system for using remote headers to secure electronic files
Rawat et al. A survey of various techniques to secure cloud storage
Murray et al. Cloud service security & application vulnerability
Yu et al. Data security in cloud computing
US20080044023A1 (en) Secure Data Transmission
Abdul-Jabbar et al. State-of-the-art in data integrity and privacy-preserving in cloud computing
CN109302400B (en) Asset password exporting method for operation and maintenance auditing system
Purushothama et al. Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
Suma et al. Blockchain usage in the electronic health record system using attribute-based signature
Verma et al. Applications of Data Security and Blockchain in Smart City Identity Management
US10892892B1 (en) Method and apparatus for end-to-end secure sharing of information with multiple recipients without maintaining a key directory
Dahshan Data security in cloud storage services
Sabitha et al. Anonymous-cpabe: Privacy preserved content disclosure for data sharing in cloud
Kathrine et al. Four-factor based privacy preserving biometric authentication and authorization scheme for enhancing grid security
Verma et al. A hybrid two layer attribute based encryption for privacy preserving in public cloud
Batten et al. Prevention of information harvesting in a cloud services environment