Gajmal et al., 2021 - Google Patents
Blockchain-based access control and data sharing mechanism in cloud decentralized storage systemGajmal et al., 2021
View PDF- Document ID
- 1293292461596905762
- Author
- Gajmal Y
- Udayakumar R
- Publication year
- Publication venue
- Journal of web engineering
External Links
Snippet
Access control is a major factor in enhancing data security in the cloud storage system. However, the existing data sharing and the access control method have privacy data leakage and key abuse, which is a major challenge in the research community. Therefore …
- 238000000034 method 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sun | Security and privacy protection in cloud computing: Discussions and challenges | |
Yang et al. | AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud | |
Samanthula et al. | A secure data sharing and query processing framework via federation of cloud computing | |
JP2012518330A (en) | Reliable cloud computing and cloud service framework | |
Darwish et al. | Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm | |
Gajmal et al. | Blockchain-based access control and data sharing mechanism in cloud decentralized storage system | |
John et al. | Provably secure data sharing approach for personal health records in cloud storage using session password, data access key, and circular interpolation | |
Huang et al. | Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing | |
Wu et al. | Secure personal health records sharing based on blockchain and IPFS | |
Guo et al. | Using blockchain to control access to cloud data | |
Sharma | A framework of big data as service platform for access control & privacy protection using blockchain network | |
Antony Saviour et al. | IPFS based file storage access control and authentication model for secure data transfer using block chain technique | |
Xu et al. | Security theories and practices for big data | |
Nie et al. | Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT | |
Xu et al. | NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems | |
Hammami et al. | Security issues in cloud computing and associated alleviation approaches | |
Han et al. | DSSPs: a data sharing security protection scheme based on consortium blockchain and ciphertext-policy attribute-based encryption | |
Senthilkumar et al. | HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud | |
Zhang et al. | Attribute Based Conjunctive Keywords Search with Verifiability and Fair Payment Using Blockchain | |
Gajmal et al. | 2 Literature Survey | |
Abirami et al. | Efficient method for storing health record in cloud using integrity auditing and data sharing | |
Pawar et al. | Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud | |
Li et al. | Searchable Proxy Re-Encryption Data Sharing Scheme Based on Consortium Chain | |
Rajasekhar et al. | Enabling trust and privacy preserving e-KYC | |
Wang et al. | Security Enhancements for Data‐Driven Systems: A Blockchain‐Based Trustworthy Data Sharing Scheme |