Yan et al., 2017 - Google Patents
Heterogeneous data access control based on trust and reputation in mobile cloud computingYan et al., 2017
- Document ID
- 9438851671201954896
- Author
- Yan Z
- Li X
- Kantola R
- Publication year
- Publication venue
- Advances in mobile cloud computing and big data in the 5G era
External Links
Snippet
Cloud computing, as an emerging computing paradigm for service provision on-demand, has blossomed into both academia and industry. One typical cloud service is cloud data storage and processing. By stepping into the era of 5G, Mobile Cloud Computing (MCC) …
- 238000011160 research 0 abstract description 24
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | A survey on secure data analytics in edge computing | |
Singh et al. | Twenty security considerations for cloud-supported Internet of Things | |
Dang et al. | A data protection model for fog computing | |
CN108702360B (en) | Digital asset protection policy using dynamic network attributes | |
Yi et al. | Security and privacy issues of fog computing: A survey | |
Huang et al. | MobiCloud: building secure cloud framework for mobile computing and communication | |
Ranchal et al. | Protection of identity information in cloud computing without trusted third party | |
Khaliq et al. | A secure and privacy preserved parking recommender system using elliptic curve cryptography and local differential privacy | |
Aleisa et al. | Access control in fog computing: Challenges and research agenda | |
Pradeep et al. | An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment | |
Li et al. | Robust access control framework for mobile cloud computing network | |
Yan et al. | Controlling cloud data access based on reputation | |
Jakóbik | Big data security | |
Tu et al. | A secure, efficient and verifiable multimedia data sharing scheme in fog networking system | |
Kotha et al. | A comprehensive review on secure data sharing in cloud environment | |
Ramu et al. | Secure architecture to manage EHR’s in cloud using SSE and ABE | |
Sarwar et al. | A brief survey on IoT privacy: Taxonomy, issues and future trends | |
Yan et al. | Heterogeneous data access control based on trust and reputation in mobile cloud computing | |
Sarwar et al. | A survey on privacy preservation in fog-enabled internet of things | |
Bingu et al. | A comprehensive review on security and privacy preservation in cloud environment | |
Olsson et al. | 5G zero trust–A Zero-Trust Architecture for Telecom | |
Idrissi et al. | Security of mobile agent platforms using access control and cryptography | |
Agrawal et al. | Access control framework using dynamic attributes encryption for mobile cloud environment | |
Mani Sekhar et al. | Security and privacy in 5G-enabled internet of things: a data analysis perspective | |
Tyagi et al. | Effective data storage security with efficient computing in cloud |