Bajaj et al., 2022 - Google Patents
Cloud security: the future of data storageBajaj et al., 2022
- Document ID
- 6595577429482501893
- Author
- Bajaj P
- Arora R
- Khurana M
- Mahajan S
- Publication year
- Publication venue
- Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021
External Links
Snippet
In this modern era, all the organizations seem to be shifting their data and services to cloud because of the increase in information leaks and data thefts. It has become easier for intruders to break into the organization's data stored locally. As cloud provides a significant …
- 238000000034 method 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Indu et al. | Identity and access management in cloud environment: Mechanisms and challenges | |
US20220224535A1 (en) | Dynamic authorization and access management | |
KR20130085472A (en) | Security system for cloud computing service | |
Scott | How a zero trust approach can help to secure your AWS environment | |
Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
Ballamudi et al. | Security and Privacy in Cloud Computing: Challenges and Opportunities | |
Bajaj et al. | Cloud security: the future of data storage | |
Muthuraj et al. | Detection and prevention of attacks on active directory using SIEM | |
Srinivasan et al. | An advanced dynamic authentic security method for cloud computing | |
Shibli et al. | Access control as a service in cloud: challenges, impact and strategies | |
Elkabbany et al. | Security issues in distributed computing system models | |
Hensley | Identity is the new perimeter in the fight against supply chain attacks | |
Salehi et al. | Cloud computing security challenges and its potential solution | |
Singh et al. | Security in amazon web services | |
Jouini et al. | Security problems in cloud computing environments: A deep analysis and a secure framework | |
Pero et al. | Implementing a zero trust environmentfor an existing on-premises cloud solution | |
Rajvanshi et al. | Data Protection in Cloud Computing | |
Lad | Application and Data Security Patterns | |
Udaykumar | Design And Deploy Secure Azure Environment | |
Kim et al. | A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment | |
Kuzminykh et al. | Mechanisms of ensuring security in Keystone service | |
Chaturvedi et al. | Zero Trust Security Architecture for Digital Privacy in Healthcare | |
Sizov | Securing Organizational Assets: A Comprehensive Analysis of Privileged Access Management | |
Rohilla et al. | Comparison of Cloud Computing Security Threats and Their Counter Measures | |
Roy et al. | A Review on Zero Trust—Balancing Security and Usability Needs |