[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Nagendran et al., 2018 - Google Patents

Hyper Elliptic Curve Cryptography (HECC) to ensure data security in the cloud

Nagendran et al., 2018

View PDF
Document ID
10413980341177887544
Author
Nagendran K
Nadesan T
Chandrika P
Chethana R
Publication year
Publication venue
Int’l Journal of Engineering & Technology

External Links

Snippet

In today's technological world, cloud computing is emerging as a trendsetting information technology service for storing data and resources and retrieving them from the Internet rather than direct server connection. This technology also enables users to save them in a …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Bhardwaj et al. Security algorithms for cloud computing
Tari et al. Security and privacy in cloud computing: vision, trends, and challenges
Darwazeh et al. A secure cloud computing model based on data classification
Athena et al. Survey on public key cryptography scheme for securing data in cloud computing
Gupta et al. Compendium of data security in cloud storage by applying hybridization of encryption algorithm
Pawar et al. Providing security and integrity for data stored in cloud storage
Castiglione et al. A secure file sharing service for distributed computing environments
Nagendran et al. Hyper Elliptic Curve Cryptography (HECC) to ensure data security in the cloud
Muthurajan et al. An elliptic curve based schnorr cloud security model in distributed environment
Mohammed et al. Secure third party auditor (tpa) for ensuring data integrity in fog computing
Abo-Alian et al. Auditing-as-a-service for cloud storage
Sarkar et al. Ensuring data storage security in cloud computing based on hybrid encryption schemes
Virvilis et al. A cloud provider-agnostic secure storage protocol
Hua et al. Secure data deletion in cloud storage: a survey
Abdalwahid et al. A New Efficient Method for Information Security in Hadoop
Xie et al. Assured Deletion: A Scheme Based on Strong Nonseparability
Barsoum Provable data possession in single cloud server: A survey, classification and comparative study
Kamboj et al. DEDUP: Deduplication system for encrypted data in cloud
Altarawneh A strong combination of cryptographic techniques to secure cloud-hosted data
Bindlish et al. Study of RSA, DES and Cloud Computing.
Vijay et al. An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol
Supriya et al. STUDY ON DATA DEDUPLICATION IN CLOUD COMPUTING.
Gaur et al. Analyzing storage and time delay by hybrid blowfish-Md5 technique
Alsufaian et al. Secure File Storage On Cloud Using Hybrid Cryptography
Karani et al. Secure File Storage Using Hybrid Cryptography