[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Nivedhaa et al., 2018 - Google Patents

A secure erasure cloud storage system using advanced encryption standard algorithm and proxy re-encryption

Nivedhaa et al., 2018

Document ID
7955733139923210102
Author
Nivedhaa R
Justus J
Publication year
Publication venue
2018 International Conference on Communication and Signal Processing (ICCSP)

External Links

Snippet

Cloud computing is a model that treats the resources on the internet as an integrated entity, cloud. Organizations proposing computing services are termed cloud providers and normally charge for their services based on the consumption. Cloud storage is an improved …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Similar Documents

Publication Publication Date Title
Nivedhaa et al. A secure erasure cloud storage system using advanced encryption standard algorithm and proxy re-encryption
US9317714B2 (en) Storing user data in a service provider cloud without exposing user-specific secrets to the service provider
Surv et al. Framework for client side AES encryption technique in cloud computing
Madhumala et al. Secure file storage & sharing on cloud using cryptography
JP2019102970A (en) Data sharing server device, key generation server device, communication terminal, and program
Ramachandran et al. Secure and efficient data forwarding in untrusted cloud environment
ManJiang et al. Design of a cloud storage security encryption algorithm for power bidding system
Gunasekaran et al. A review on enhancing data security in cloud computing using rsa and aes algorithms
Lei et al. Towards efficient re-encryption for secure client-side deduplication in public clouds
Roy et al. Proxy re-encryption schemes for secure cloud data and applications: a survey
Jenefa et al. A cloud storage system with data confidentiality and data forwarding
US11451518B2 (en) Communication device, server device, concealed communication system, methods for the same, and program
Verma et al. Light weight encryption technique for group communication in cloud computing environment
Suganya et al. A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURED DATA FORWARDING
Gupta et al. A novel security framework for threat management of cloud based computing networks
Jahan et al. Securely distributing files in cloud environment by dispensing asymmetric key management system applying hashing
Reddy et al. Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques
Lavanya et al. Anonymous data sharing scheme for dynamic groups in an untrusted cloud
Bhaurao et al. Privacy preservation and secure data sharing in cloud storage
Sedhu et al. SECURE CLOUD COMPUTING BASED SHARING AND STORAGE WITH DUAL ACCESS CONTROL
Al-Maliki et al. Using Security Features for Cloud Computing Based on New Symmetric Key Algorithm
Krishnaiah et al. A Collaborative Approach to Cloud-Based Functional Packaging: Sharing Intelligence Data Securely
Patil et al. Survey Paper On Modoc: Multi Owner Data Sharing Over Cloud
Saleh et al. Secure distributed data using multi-cloud
Liu et al. Efficient and secure data forwarding for erasure-code-based cloud storage