Nivedhaa et al., 2018 - Google Patents
A secure erasure cloud storage system using advanced encryption standard algorithm and proxy re-encryptionNivedhaa et al., 2018
- Document ID
- 7955733139923210102
- Author
- Nivedhaa R
- Justus J
- Publication year
- Publication venue
- 2018 International Conference on Communication and Signal Processing (ICCSP)
External Links
Snippet
Cloud computing is a model that treats the resources on the internet as an integrated entity, cloud. Organizations proposing computing services are termed cloud providers and normally charge for their services based on the consumption. Cloud storage is an improved …
- 238000000034 method 0 abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nivedhaa et al. | A secure erasure cloud storage system using advanced encryption standard algorithm and proxy re-encryption | |
US9317714B2 (en) | Storing user data in a service provider cloud without exposing user-specific secrets to the service provider | |
Surv et al. | Framework for client side AES encryption technique in cloud computing | |
Madhumala et al. | Secure file storage & sharing on cloud using cryptography | |
JP2019102970A (en) | Data sharing server device, key generation server device, communication terminal, and program | |
Ramachandran et al. | Secure and efficient data forwarding in untrusted cloud environment | |
ManJiang et al. | Design of a cloud storage security encryption algorithm for power bidding system | |
Gunasekaran et al. | A review on enhancing data security in cloud computing using rsa and aes algorithms | |
Lei et al. | Towards efficient re-encryption for secure client-side deduplication in public clouds | |
Roy et al. | Proxy re-encryption schemes for secure cloud data and applications: a survey | |
Jenefa et al. | A cloud storage system with data confidentiality and data forwarding | |
US11451518B2 (en) | Communication device, server device, concealed communication system, methods for the same, and program | |
Verma et al. | Light weight encryption technique for group communication in cloud computing environment | |
Suganya et al. | A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURED DATA FORWARDING | |
Gupta et al. | A novel security framework for threat management of cloud based computing networks | |
Jahan et al. | Securely distributing files in cloud environment by dispensing asymmetric key management system applying hashing | |
Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques | |
Lavanya et al. | Anonymous data sharing scheme for dynamic groups in an untrusted cloud | |
Bhaurao et al. | Privacy preservation and secure data sharing in cloud storage | |
Sedhu et al. | SECURE CLOUD COMPUTING BASED SHARING AND STORAGE WITH DUAL ACCESS CONTROL | |
Al-Maliki et al. | Using Security Features for Cloud Computing Based on New Symmetric Key Algorithm | |
Krishnaiah et al. | A Collaborative Approach to Cloud-Based Functional Packaging: Sharing Intelligence Data Securely | |
Patil et al. | Survey Paper On Modoc: Multi Owner Data Sharing Over Cloud | |
Saleh et al. | Secure distributed data using multi-cloud | |
Liu et al. | Efficient and secure data forwarding for erasure-code-based cloud storage |