[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Yan et al., 2017 - Google Patents

Heterogeneous data access control based on trust and reputation in mobile cloud computing

Yan et al., 2017

Document ID
9438851671201954896
Author
Yan Z
Li X
Kantola R
Publication year
Publication venue
Advances in mobile cloud computing and big data in the 5G era

External Links

Snippet

Cloud computing, as an emerging computing paradigm for service provision on-demand, has blossomed into both academia and industry. One typical cloud service is cloud data storage and processing. By stepping into the era of 5G, Mobile Cloud Computing (MCC) …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
Liu et al. A survey on secure data analytics in edge computing
Singh et al. Twenty security considerations for cloud-supported Internet of Things
Dang et al. A data protection model for fog computing
CN108702360B (en) Digital asset protection policy using dynamic network attributes
Yi et al. Security and privacy issues of fog computing: A survey
Huang et al. MobiCloud: building secure cloud framework for mobile computing and communication
Ranchal et al. Protection of identity information in cloud computing without trusted third party
Khaliq et al. A secure and privacy preserved parking recommender system using elliptic curve cryptography and local differential privacy
Aleisa et al. Access control in fog computing: Challenges and research agenda
Pradeep et al. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
Li et al. Robust access control framework for mobile cloud computing network
Yan et al. Controlling cloud data access based on reputation
Jakóbik Big data security
Tu et al. A secure, efficient and verifiable multimedia data sharing scheme in fog networking system
Kotha et al. A comprehensive review on secure data sharing in cloud environment
Ramu et al. Secure architecture to manage EHR’s in cloud using SSE and ABE
Sarwar et al. A brief survey on IoT privacy: Taxonomy, issues and future trends
Yan et al. Heterogeneous data access control based on trust and reputation in mobile cloud computing
Sarwar et al. A survey on privacy preservation in fog-enabled internet of things
Bingu et al. A comprehensive review on security and privacy preservation in cloud environment
Olsson et al. 5G zero trust–A Zero-Trust Architecture for Telecom
Idrissi et al. Security of mobile agent platforms using access control and cryptography
Agrawal et al. Access control framework using dynamic attributes encryption for mobile cloud environment
Mani Sekhar et al. Security and privacy in 5G-enabled internet of things: a data analysis perspective
Tyagi et al. Effective data storage security with efficient computing in cloud