[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Subramanian et al., 2016 - Google Patents

Data security in single and multi cloud storage–an overview

Subramanian et al., 2016

View PDF
Document ID
11402053954702705157
Author
Subramanian K
John F
Publication year
Publication venue
International Journal of Innovative Research in Computer and Communication Engineering

External Links

Snippet

In the modern era of computing, Cloud computing will play a major role in the Internet of Services. Although many cloud service models are there, Infrastructure as a Service (IAAS) has become the foundation of the future Internet of Services (IoS). Many advantages of cloud …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Similar Documents

Publication Publication Date Title
Mansfield-Devine Ransomware: taking businesses hostage
EP3259726B1 (en) Cloud encryption key broker apparatuses, methods and systems
Novaes Neto et al. A case study of the capital one data breach
Bhajantri et al. A survey of cloud computing security challenges, issues and their countermeasures
Jakóbik Big data security
Jouini et al. Surveying and analyzing security problems in cloud computing environments
Patil Madhubala Survey on security concerns in Cloud computing
Ambhire et al. Information security in banking and financial industry
Lakhwani et al. An extensive survey on data authentication schemes in cloud computing
Shareef Enhancing security of information in E-government
Silva Web 3.0 and Cybersecurity–Short Paper
Subramanian et al. Data security in single and multi cloud storage–an overview
Agarkhed et al. Security and privacy for data storage service scheme in cloud computing
AlZadjali et al. An analysis of the security threats and vulnerabilities of cloud computing in oman
Jabłoński et al. Information systems development and usage with consideration of privacy and cyber security aspects
Saeed et al. Analytical Approach for Security of Sensitive Business Cloud
MOHAMAD et al. Data Security and Privacy Issues in Cloud Computing: Challenges and Solutions Review
Anand et al. Bitcoins and crimes
Mupila et al. An Innovative Authentication Model for the Enhancement of Cloud Security
Pawar et al. Implementation of secure authentication scheme and access control in cloud computing
Schulz et al. Options to improve the general model of security management in private bank with GDPR compliance
França et al. An Overview of Data Privacy and Security in Cloud Platforms: Exploring the Intersection of Digital Technologies Currently
Neela et al. Cloud computing: Threats and security issues
Bhandari et al. A Preliminary Study On Emerging Cloud Computing Security Challenges
Alkhammash et al. A Bitcoin Wallet Security System (BWSS)