[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Gajmal et al., 2021 - Google Patents

Blockchain-based access control and data sharing mechanism in cloud decentralized storage system

Gajmal et al., 2021

View PDF
Document ID
1293292461596905762
Author
Gajmal Y
Udayakumar R
Publication year
Publication venue
Journal of web engineering

External Links

Snippet

Access control is a major factor in enhancing data security in the cloud storage system. However, the existing data sharing and the access control method have privacy data leakage and key abuse, which is a major challenge in the research community. Therefore …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content

Similar Documents

Publication Publication Date Title
Sun Security and privacy protection in cloud computing: Discussions and challenges
Yang et al. AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud
Samanthula et al. A secure data sharing and query processing framework via federation of cloud computing
JP2012518330A (en) Reliable cloud computing and cloud service framework
Darwish et al. Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm
Gajmal et al. Blockchain-based access control and data sharing mechanism in cloud decentralized storage system
John et al. Provably secure data sharing approach for personal health records in cloud storage using session password, data access key, and circular interpolation
Huang et al. Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
Wu et al. Secure personal health records sharing based on blockchain and IPFS
Guo et al. Using blockchain to control access to cloud data
Sharma A framework of big data as service platform for access control & privacy protection using blockchain network
Antony Saviour et al. IPFS based file storage access control and authentication model for secure data transfer using block chain technique
Xu et al. Security theories and practices for big data
Nie et al. Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT
Xu et al. NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems
Hammami et al. Security issues in cloud computing and associated alleviation approaches
Han et al. DSSPs: a data sharing security protection scheme based on consortium blockchain and ciphertext-policy attribute-based encryption
Senthilkumar et al. HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud
Zhang et al. Attribute Based Conjunctive Keywords Search with Verifiability and Fair Payment Using Blockchain
Gajmal et al. 2 Literature Survey
Abirami et al. Efficient method for storing health record in cloud using integrity auditing and data sharing
Pawar et al. Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud
Li et al. Searchable Proxy Re-Encryption Data Sharing Scheme Based on Consortium Chain
Rajasekhar et al. Enabling trust and privacy preserving e-KYC
Wang et al. Security Enhancements for Data‐Driven Systems: A Blockchain‐Based Trustworthy Data Sharing Scheme