Divya et al., 2019 - Google Patents
A combined data storage with encryption and keyword based data retrieval using SCDS-TM model in cloudDivya et al., 2019
View PDF- Document ID
- 1451894464232554515
- Author
- Divya S
- Shaji R
- Venkadesh P
- Publication year
- Publication venue
- Malaysian Journal of Computer Science
External Links
Snippet
With the hasty growth of the Internet technologies and the need for increased computational methods, cloud computing has become a new paradigm in the business and IT endeavors. This technology facilitates the enterprises to move their confidential data into the cloud …
- 238000003860 storage 0 title abstract description 94
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Privacy-preserving public auditing for data storage security in cloud computing | |
Yang et al. | Provable data possession of resource-constrained mobile devices in cloud computing | |
EP2396922B1 (en) | Trusted cloud computing and services framework | |
Mahalakshmi et al. | Public auditing scheme for integrity verification in distributed cloud storage system | |
David et al. | Cloud Security Service for Identifying Unauthorized User Behaviour. | |
US20110276490A1 (en) | Security service level agreements with publicly verifiable proofs of compliance | |
Kumar et al. | A systematic review of the security in cloud computing: data integrity, confidentiality and availability | |
Fugkeaw | Enabling trust and privacy-preserving e-KYC system using blockchain | |
Babel et al. | Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs | |
Win et al. | Privacy enabled digital rights management without trusted third party assumption | |
Kim et al. | Privacy-preserving public auditing for educational multimedia data in cloud computing | |
Gajmal et al. | Blockchain-based access control and data sharing mechanism in cloud decentralized storage system | |
Guo et al. | Using blockchain to control access to cloud data | |
George et al. | Ethereum blockchain-based authentication approach for Data Sharing in Cloud Storage Model | |
Mishra et al. | Fine-grained access control of files stored in cloud storage with traceable and revocable multi-authority CP-ABE scheme | |
Gowda et al. | Blockchain-based access control model with privacy preservation in a fog computing environment | |
Murthy | Cryptographic secure cloud storage model with anonymous authentication and automatic file recovery | |
Kaaniche et al. | Id-based user-centric data usage auditing scheme for distributed environments | |
Divya et al. | A combined data storage with encryption and keyword based data retrieval using SCDS-TM model in cloud | |
Pulls | Privacy-Friendly cloud storage for the data track: an educational transparency tool | |
Akshay et al. | Dynamic list based data integrity verification in cloud environment | |
Sowmiya et al. | Secure cloud storage model with hidden policy attribute based access control | |
Dongare et al. | Panda: Public auditing for shared data with efficient user revocation in the cloud | |
Ilokah | Design of a secure privacy preserving cloud based framework for sharing electronic health data | |
Tanwar et al. | Design and implementation of a secure hierarchical trust model for PKI |