[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bajaj et al., 2022 - Google Patents

Cloud security: the future of data storage

Bajaj et al., 2022

Document ID
6595577429482501893
Author
Bajaj P
Arora R
Khurana M
Mahajan S
Publication year
Publication venue
Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021

External Links

Snippet

In this modern era, all the organizations seem to be shifting their data and services to cloud because of the increase in information leaks and data thefts. It has become easier for intruders to break into the organization's data stored locally. As cloud provides a significant …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Indu et al. Identity and access management in cloud environment: Mechanisms and challenges
US20220224535A1 (en) Dynamic authorization and access management
KR20130085472A (en) Security system for cloud computing service
Scott How a zero trust approach can help to secure your AWS environment
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
Ballamudi et al. Security and Privacy in Cloud Computing: Challenges and Opportunities
Bajaj et al. Cloud security: the future of data storage
Muthuraj et al. Detection and prevention of attacks on active directory using SIEM
Srinivasan et al. An advanced dynamic authentic security method for cloud computing
Shibli et al. Access control as a service in cloud: challenges, impact and strategies
Elkabbany et al. Security issues in distributed computing system models
Hensley Identity is the new perimeter in the fight against supply chain attacks
Salehi et al. Cloud computing security challenges and its potential solution
Singh et al. Security in amazon web services
Jouini et al. Security problems in cloud computing environments: A deep analysis and a secure framework
Pero et al. Implementing a zero trust environmentfor an existing on-premises cloud solution
Rajvanshi et al. Data Protection in Cloud Computing
Lad Application and Data Security Patterns
Udaykumar Design And Deploy Secure Azure Environment
Kim et al. A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment
Kuzminykh et al. Mechanisms of ensuring security in Keystone service
Chaturvedi et al. Zero Trust Security Architecture for Digital Privacy in Healthcare
Sizov Securing Organizational Assets: A Comprehensive Analysis of Privileged Access Management
Rohilla et al. Comparison of Cloud Computing Security Threats and Their Counter Measures
Roy et al. A Review on Zero Trust—Balancing Security and Usability Needs