Nagendran et al., 2018 - Google Patents
Hyper Elliptic Curve Cryptography (HECC) to ensure data security in the cloudNagendran et al., 2018
View PDF- Document ID
- 10413980341177887544
- Author
- Nagendran K
- Nadesan T
- Chandrika P
- Chethana R
- Publication year
- Publication venue
- Int’l Journal of Engineering & Technology
External Links
Snippet
In today's technological world, cloud computing is emerging as a trendsetting information technology service for storing data and resources and retrieving them from the Internet rather than direct server connection. This technology also enables users to save them in a …
- 238000005516 engineering process 0 abstract description 14
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhardwaj et al. | Security algorithms for cloud computing | |
Tari et al. | Security and privacy in cloud computing: vision, trends, and challenges | |
Darwazeh et al. | A secure cloud computing model based on data classification | |
Athena et al. | Survey on public key cryptography scheme for securing data in cloud computing | |
Gupta et al. | Compendium of data security in cloud storage by applying hybridization of encryption algorithm | |
Pawar et al. | Providing security and integrity for data stored in cloud storage | |
Castiglione et al. | A secure file sharing service for distributed computing environments | |
Nagendran et al. | Hyper Elliptic Curve Cryptography (HECC) to ensure data security in the cloud | |
Muthurajan et al. | An elliptic curve based schnorr cloud security model in distributed environment | |
Mohammed et al. | Secure third party auditor (tpa) for ensuring data integrity in fog computing | |
Abo-Alian et al. | Auditing-as-a-service for cloud storage | |
Sarkar et al. | Ensuring data storage security in cloud computing based on hybrid encryption schemes | |
Virvilis et al. | A cloud provider-agnostic secure storage protocol | |
Hua et al. | Secure data deletion in cloud storage: a survey | |
Abdalwahid et al. | A New Efficient Method for Information Security in Hadoop | |
Xie et al. | Assured Deletion: A Scheme Based on Strong Nonseparability | |
Barsoum | Provable data possession in single cloud server: A survey, classification and comparative study | |
Kamboj et al. | DEDUP: Deduplication system for encrypted data in cloud | |
Altarawneh | A strong combination of cryptographic techniques to secure cloud-hosted data | |
Bindlish et al. | Study of RSA, DES and Cloud Computing. | |
Vijay et al. | An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol | |
Supriya et al. | STUDY ON DATA DEDUPLICATION IN CLOUD COMPUTING. | |
Gaur et al. | Analyzing storage and time delay by hybrid blowfish-Md5 technique | |
Alsufaian et al. | Secure File Storage On Cloud Using Hybrid Cryptography | |
Karani et al. | Secure File Storage Using Hybrid Cryptography |