Olaleye et al., 2017 - Google Patents
SoloEncrypt: A Smartphone Storage Enhancement Security Model for Securing users Sensitive DataOlaleye et al., 2017
View PDF- Document ID
- 10051094320459292581
- Author
- Olaleye S
- Ranjan I
- Ojha S
- Publication year
- Publication venue
- Indian Journal of Science and Technology
External Links
Snippet
Objectives: To enhance the storage space of smart phones by using cloud infrastructure for storage. However, the biggest challenge is data security. Methods/Statistical Analysis: Existing Android smart phones are studied and a new security model named Solo-Encrypt …
- 230000002708 enhancing 0 abstract description 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10341094B2 (en) | Multiple encrypting method and system for encrypting a file and/or a protocol | |
US9413754B2 (en) | Authenticator device facilitating file security | |
Akhil et al. | Enhanced cloud data security using AES algorithm | |
CN105306194B (en) | Multiple encryption method and system for encrypting files and/or communication protocols | |
CN105491058B (en) | API access distributed authorization method and system | |
CA3057854A1 (en) | Method and system for hierarchical cryptographic key management | |
Abdul Hussien et al. | [Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites | |
CN106452770A (en) | Data encryption method and apparatus, data decryption method and apparatus, and system | |
Bossi et al. | What users should know about full disk encryption based on LUKS | |
US20140064478A1 (en) | User input based data encryption | |
Alqahtani et al. | Multi-clouds mobile computing for the secure storage of data | |
Olaleye et al. | SoloEncrypt: A Smartphone Storage Enhancement Security Model for Securing users Sensitive Data | |
Oli et al. | Confidentiality technique to encrypt and obfuscate non-numerical and numerical data to enhance security in public cloud storage | |
CN116049802B (en) | Application single sign-on method, system, computer equipment and storage medium | |
Shin et al. | Forensic analysis of note and journal applications | |
Mathur et al. | Comparative study of cryptography for cloud computing for data security | |
Gasti et al. | Breaking and fixing the self encryption scheme for data security in mobile devices | |
Rao et al. | Data security in cloud computing | |
Olaleye et al. | Secure use of cloud storage of data on smartphones using atomic AES on ARM architectures | |
Mathur et al. | Comparative study of cryptography for cloud computing for data security | |
Arvin S. Lat et al. | SOUL System: secure online USB login system | |
Nandhini et al. | Time Constrained Data Destruction in Cloud | |
Elganzoury et al. | A Provably Secure Android-Based Mobile Banking Protocol | |
TWI554073B (en) | A multiple encrypting method and system for encrypting a file and/or a protocol | |
Pawar et al. | Comparative Analysis of PAVD Security System with Security Mechanism of Different Cloud Storage Services |