[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Divya et al., 2019 - Google Patents

A combined data storage with encryption and keyword based data retrieval using SCDS-TM model in cloud

Divya et al., 2019

View PDF
Document ID
1451894464232554515
Author
Divya S
Shaji R
Venkadesh P
Publication year
Publication venue
Malaysian Journal of Computer Science

External Links

Snippet

With the hasty growth of the Internet technologies and the need for increased computational methods, cloud computing has become a new paradigm in the business and IT endeavors. This technology facilitates the enterprises to move their confidential data into the cloud …
Continue reading at mjs.um.edu.my (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Similar Documents

Publication Publication Date Title
Wang et al. Privacy-preserving public auditing for data storage security in cloud computing
Yang et al. Provable data possession of resource-constrained mobile devices in cloud computing
EP2396922B1 (en) Trusted cloud computing and services framework
Mahalakshmi et al. Public auditing scheme for integrity verification in distributed cloud storage system
David et al. Cloud Security Service for Identifying Unauthorized User Behaviour.
US20110276490A1 (en) Security service level agreements with publicly verifiable proofs of compliance
Kumar et al. A systematic review of the security in cloud computing: data integrity, confidentiality and availability
Fugkeaw Enabling trust and privacy-preserving e-KYC system using blockchain
Babel et al. Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs
Win et al. Privacy enabled digital rights management without trusted third party assumption
Kim et al. Privacy-preserving public auditing for educational multimedia data in cloud computing
Gajmal et al. Blockchain-based access control and data sharing mechanism in cloud decentralized storage system
Guo et al. Using blockchain to control access to cloud data
George et al. Ethereum blockchain-based authentication approach for Data Sharing in Cloud Storage Model
Mishra et al. Fine-grained access control of files stored in cloud storage with traceable and revocable multi-authority CP-ABE scheme
Gowda et al. Blockchain-based access control model with privacy preservation in a fog computing environment
Murthy Cryptographic secure cloud storage model with anonymous authentication and automatic file recovery
Kaaniche et al. Id-based user-centric data usage auditing scheme for distributed environments
Divya et al. A combined data storage with encryption and keyword based data retrieval using SCDS-TM model in cloud
Pulls Privacy-Friendly cloud storage for the data track: an educational transparency tool
Akshay et al. Dynamic list based data integrity verification in cloud environment
Sowmiya et al. Secure cloud storage model with hidden policy attribute based access control
Dongare et al. Panda: Public auditing for shared data with efficient user revocation in the cloud
Ilokah Design of a secure privacy preserving cloud based framework for sharing electronic health data
Tanwar et al. Design and implementation of a secure hierarchical trust model for PKI