[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Manaa et al., 2017 - Google Patents

Data encryption scheme for large data scale in cloud computing

Manaa et al., 2017

View PDF
Document ID
18186900867990447254
Author
Manaa M
et al.
Publication year
Publication venue
Journal of Telecommunication, Electronic and Computer Engineering (JTEC)

External Links

Snippet

Cloud computing is a power full platform to deliver applications over the internet or a private network. It considers the next technology in data manipulating and retrieving. These technologies help to manage and manipulate data in various services and deployment …
Continue reading at jtec.utem.edu.my (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0722Content

Similar Documents

Publication Publication Date Title
Tabrizchi et al. A survey on security challenges in cloud computing: issues, threats, and solutions
Singh et al. Cloud security issues and challenges: A survey
Modi et al. A survey on security issues and solutions at different layers of Cloud computing
Alhenaki et al. A survey on the security of cloud computing
An et al. Reviews on security issues and challenges in cloud computing
Sugumaran et al. An architecture for data security in cloud computing
Kumar et al. Exploring security issues and solutions in cloud computing services–a survey
Shah et al. Security issues on cloud computing
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
Abdul-Jabbar et al. Integrity and security in cloud computing environment: a review
Kaur et al. Threat and vulnerability analysis of cloud platform: a user perspective
Manaa Data encryption scheme for large data scale in cloud computing
Chuka-Maduji et al. Cloud computing security challenges and related defensive measures: A survey and taxonomy
Lemoudden et al. A Survey of Cloud Computing Security Overview of Attack Vectors and Defense Mechanisms.
Shajan et al. Survey of security threats and countermeasures in cloud computing
Ennajjar et al. Security in cloud computing approaches and solutions
Aich et al. Study on cloud security risk and remedy
Shah et al. Appraisal of the Most Prominent Attacks due to vulnerabilities in cloud computing
Raj et al. Mapping of Security Issues and Concerns in Cloud Computing with Compromised Security Attributes
Sangui et al. Cloud Security Using Honeypot Network and Blockchain: A Review
Shyam et al. Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey.
Chaudhari et al. A review on cloud security issues and solutions
Faizi et al. Secured Cloud for Enterprise Computing.
Sanger et al. Survey of Security Issues in Cloud
Ramachandran et al. Big Data in Cloud Computing-A Defense Mechanism