Guha et al., 2013 - Google Patents
Review of information authentication in mobile cloud over SaaS & PaaS layersGuha et al., 2013
View PDF- Document ID
- 2272624233821509706
- Author
- Guha V
- Shrivastava M
- Publication year
- Publication venue
- International Journal of Advanced Computer Research (IJACR)
External Links
Snippet
The Revolution has begun; time has come when we no more have to worry about the size, format & storage of data at a single place. Cloud computing is a revolution which has made world of internet more like a place of dynamic storage & facilitator of new methodology …
- 238000005516 engineering process 0 abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | Cloud security using hybrid cryptography algorithms | |
Jakimoski | Security techniques for data protection in cloud computing | |
Sanka et al. | Secure data access in cloud computing | |
Ranchal et al. | Protection of identity information in cloud computing without trusted third party | |
Arora et al. | Cloud security ecosystem for data security and privacy | |
Marium et al. | Implementation of EAP with RSA for enhancing the security of cloud computing | |
Sugumaran et al. | An architecture for data security in cloud computing | |
Hussein et al. | A survey of cryptography cloud storage techniques | |
Junghanns et al. | Engineering of secure multi-cloud storage | |
Guha et al. | Review of information authentication in mobile cloud over SaaS & PaaS layers | |
Degambur et al. | A Study of Security Impacts and Cryptographic Techniques in Cloud-based e-Learning Technologies | |
Sharma et al. | Cloud computing risks and recommendations for security | |
Wang et al. | Security of cloud computing lightweight authentication protocol | |
Ullah et al. | Tcloud: Challenges And Best Practices For Cloud Computing | |
Vijay et al. | An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol | |
Bobde et al. | An approach for securing data on Cloud using data slicing and cryptography | |
Dahiya et al. | IMPLEMENTING MULTILEVEL DATA SECURITY IN CLOUD COMPUTING. | |
Apostol et al. | A survey on privacy enhancements for massively scalable storage systems in public cloud environments | |
Raja et al. | An enhanced study on cloud data services using security technologies | |
Sharma et al. | Survey on Cloud Computing Security Policies and Privacy Concerns for Information Security. | |
Imine | Cloud computing security | |
Ranjan et al. | Improved technique for data confidentiality in cloud environment | |
Pooja et al. | Privacy preserving issues and their solutions in cloud computing: a survey | |
Waizenegger | Data security in multi-tenant environments in the cloud | |
Latha et al. | A Systematic Literature Review on Security in Cloud Technology |