Paul et al., 2021 - Google Patents
Enhanced Trust Based Access Control for Multi-Cloud Environment.Paul et al., 2021
View PDF- Document ID
- 9919513954876106339
- Author
- Paul N
- Raj D
- Publication year
- Publication venue
- Computers, Materials & Continua
External Links
Snippet
Security is an essential part of the cloud environment. For ensuring the security of the data being communicated to and from the cloud server, a significant parameter called trust was introduced. Trust-based security played a vital role in ensuring that the communication …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mishra et al. | Privacy protected blockchain based architecture and implementation for sharing of students’ credentials | |
Sun | Privacy protection and data security in cloud computing: a survey, challenges, and solutions | |
US11528258B2 (en) | System and apparatus for data confidentiality in distributed ledger | |
Kaaniche et al. | Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms | |
WO2020119258A1 (en) | Data processing method and device | |
US20140281491A1 (en) | Identity escrow management for minimal disclosure credentials | |
Paul et al. | Enhanced Trust Based Access Control for Multi-Cloud Environment. | |
GB2460412A (en) | Personally Identifiable Information access wherein an authorised requestor can delegate access by passing a token with verifiable information | |
Hussein et al. | A survey of cryptography cloud storage techniques | |
CN113347008B (en) | Loan information storage method adopting addition homomorphic encryption | |
Kirubakaran et al. | Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment. | |
Manjusha et al. | Secure authentication and access system for cloud computing auditing services using associated digital certificate | |
Rashid et al. | RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations | |
US20230128879A1 (en) | Knowledge proof method, storage medium, and information processing device | |
Pugazhenthi et al. | Data access control and secured data sharing approach for health care data in cloud environment | |
Wu et al. | EBSS: A secure blockchain-based sharing scheme for real estate financial credentials | |
Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
US20240281558A1 (en) | Apparatus and method for privacy control, device, cloud server, apparatus and method for local privacy control | |
Tiwari et al. | Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos | |
Divya et al. | A combined data storage with encryption and keyword based data retrieval using SCDS-TM model in cloud | |
Velmurugan et al. | Provably secure data selective sharing scheme with cloud-based decentralized trust management systems | |
Bingu et al. | Cloud auditing and authentication scheme for establishing privacy preservation | |
Thangavel et al. | A review on public auditing in cloud environment | |
Bistarelli et al. | Policy-based Credential Disclosure in SSI by Using ORCON-based Access Control | |
Fugkeaw et al. | Secure and Fine-grained Access Control with Optimized Revocation for Outsourced IoT EHRs With Adaptive Load-Sharing in Fog-Assisted Cloud Environment |