[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Paul et al., 2021 - Google Patents

Enhanced Trust Based Access Control for Multi-Cloud Environment.

Paul et al., 2021

View PDF
Document ID
9919513954876106339
Author
Paul N
Raj D
Publication year
Publication venue
Computers, Materials & Continua

External Links

Snippet

Security is an essential part of the cloud environment. For ensuring the security of the data being communicated to and from the cloud server, a significant parameter called trust was introduced. Trust-based security played a vital role in ensuring that the communication …
Continue reading at cdn.techscience.cn (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Mishra et al. Privacy protected blockchain based architecture and implementation for sharing of students’ credentials
Sun Privacy protection and data security in cloud computing: a survey, challenges, and solutions
US11528258B2 (en) System and apparatus for data confidentiality in distributed ledger
Kaaniche et al. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
WO2020119258A1 (en) Data processing method and device
US20140281491A1 (en) Identity escrow management for minimal disclosure credentials
Paul et al. Enhanced Trust Based Access Control for Multi-Cloud Environment.
GB2460412A (en) Personally Identifiable Information access wherein an authorised requestor can delegate access by passing a token with verifiable information
Hussein et al. A survey of cryptography cloud storage techniques
CN113347008B (en) Loan information storage method adopting addition homomorphic encryption
Kirubakaran et al. Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment.
Manjusha et al. Secure authentication and access system for cloud computing auditing services using associated digital certificate
Rashid et al. RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations
US20230128879A1 (en) Knowledge proof method, storage medium, and information processing device
Pugazhenthi et al. Data access control and secured data sharing approach for health care data in cloud environment
Wu et al. EBSS: A secure blockchain-based sharing scheme for real estate financial credentials
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
US20240281558A1 (en) Apparatus and method for privacy control, device, cloud server, apparatus and method for local privacy control
Tiwari et al. Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos
Divya et al. A combined data storage with encryption and keyword based data retrieval using SCDS-TM model in cloud
Velmurugan et al. Provably secure data selective sharing scheme with cloud-based decentralized trust management systems
Bingu et al. Cloud auditing and authentication scheme for establishing privacy preservation
Thangavel et al. A review on public auditing in cloud environment
Bistarelli et al. Policy-based Credential Disclosure in SSI by Using ORCON-based Access Control
Fugkeaw et al. Secure and Fine-grained Access Control with Optimized Revocation for Outsourced IoT EHRs With Adaptive Load-Sharing in Fog-Assisted Cloud Environment