Subramanian et al., 2016 - Google Patents
Data security in single and multi cloud storage–an overviewSubramanian et al., 2016
View PDF- Document ID
- 11402053954702705157
- Author
- Subramanian K
- John F
- Publication year
- Publication venue
- International Journal of Innovative Research in Computer and Communication Engineering
External Links
Snippet
In the modern era of computing, Cloud computing will play a major role in the Internet of Services. Although many cloud service models are there, Infrastructure as a Service (IAAS) has become the foundation of the future Internet of Services (IoS). Many advantages of cloud …
- 238000000034 method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mansfield-Devine | Ransomware: taking businesses hostage | |
EP3259726B1 (en) | Cloud encryption key broker apparatuses, methods and systems | |
Novaes Neto et al. | A case study of the capital one data breach | |
Bhajantri et al. | A survey of cloud computing security challenges, issues and their countermeasures | |
Jakóbik | Big data security | |
Jouini et al. | Surveying and analyzing security problems in cloud computing environments | |
Patil Madhubala | Survey on security concerns in Cloud computing | |
Ambhire et al. | Information security in banking and financial industry | |
Lakhwani et al. | An extensive survey on data authentication schemes in cloud computing | |
Shareef | Enhancing security of information in E-government | |
Silva | Web 3.0 and Cybersecurity–Short Paper | |
Subramanian et al. | Data security in single and multi cloud storage–an overview | |
Agarkhed et al. | Security and privacy for data storage service scheme in cloud computing | |
AlZadjali et al. | An analysis of the security threats and vulnerabilities of cloud computing in oman | |
Jabłoński et al. | Information systems development and usage with consideration of privacy and cyber security aspects | |
Saeed et al. | Analytical Approach for Security of Sensitive Business Cloud | |
MOHAMAD et al. | Data Security and Privacy Issues in Cloud Computing: Challenges and Solutions Review | |
Anand et al. | Bitcoins and crimes | |
Mupila et al. | An Innovative Authentication Model for the Enhancement of Cloud Security | |
Pawar et al. | Implementation of secure authentication scheme and access control in cloud computing | |
Schulz et al. | Options to improve the general model of security management in private bank with GDPR compliance | |
França et al. | An Overview of Data Privacy and Security in Cloud Platforms: Exploring the Intersection of Digital Technologies Currently | |
Neela et al. | Cloud computing: Threats and security issues | |
Bhandari et al. | A Preliminary Study On Emerging Cloud Computing Security Challenges | |
Alkhammash et al. | A Bitcoin Wallet Security System (BWSS) |