Rawther et al., 2025 - Google Patents
Protecting Cloud Computing Environments from Malicious Attacks Using multi-factor Authentication and Modified DNA CryptographyRawther et al., 2025
- Document ID
- 15840333695503149726
- Author
- Rawther S
- Sivaji S
- Publication year
- Publication venue
- Recent Patents on Engineering
External Links
Snippet
Introduction Cloud computing has become an essential technology for data storage and sharing, but security concerns remain significant challenges. Authentication is one of the critical components of cloud security. Various authentication schemes have been proposed …
- 238000012552 review 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Carmel et al. | A survey on biometric authentication systems in cloud to combat identity theft | |
Houy et al. | Security aspects of cryptocurrency wallets—a systematic literature review | |
Mohammed et al. | Current multi-factor of authentication: Approaches, requirements, attacks and challenges | |
Sharma et al. | A survey on biometric cryptosystems and their applications | |
Kumar et al. | Privacy preservation and security challenges: a new frontier multimodal machine learning research | |
Mahinderjit Singh et al. | A novel out-of-band biometrics authentication scheme for wearable devices | |
Rawther et al. | Protecting Cloud Computing Environments from Malicious Attacks Using multi-factor Authentication and Modified DNA Cryptography | |
Goel et al. | LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks | |
Boonkrong et al. | Multi-factor authentication | |
Rajora et al. | Data security breaches and mitigating methods in the healthcare system: A review | |
Tiwari et al. | Emerging Biometric Modalities and Integration Challenges | |
Verma et al. | A novel model to enhance the data security in cloud environment | |
Fernando et al. | Challenges and Opportunities in Password Management: A Review of Current Solutions | |
Kaur et al. | Remote multimodal biometric authentication using visual cryptography | |
Wilusz et al. | Security analysis of transaction authorization methods for next generation electronic payment services | |
Abbasi et al. | A lightweight and robust authentication scheme for the healthcare system using public cloud server | |
Alkhalifah | Password based authentication for web based graphics computing services retrieval in cloud | |
Mondal et al. | Iot data security with machine learning blckchain: Risks and countermeasures | |
Mohammed et al. | A hybrid approach for secure iris-based authentication in IoT | |
Tabassum et al. | An enhancement of kerberos using biometric template and steganography | |
Wang et al. | The Case for Two-Factor Authentication-Evidence from a Systematic Literature Review | |
Lotfy et al. | A secure signature scheme for IoT blockchain framework based on multimodal biometrics | |
Safder | PASSWORD SECURITY, AN ANALYSIS OF AUTHENTICATION METHODS | |
Haritha et al. | Protection & Privacy Embedding Blockchain Established Fraud Detection | |
Meraoumia et al. | Biometric cryptosystem to secure smart object communications in the internet of things |