[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Gupta et al., 2023 - Google Patents

Compendium of data security in cloud storage by applying hybridization of encryption algorithm

Gupta et al., 2023

View PDF
Document ID
2346496876294160801
Author
Gupta I
Gurnani D
Gupta N
Singla C
Thakral P
Singh A
Publication year
Publication venue
Authorea Preprints

External Links

Snippet

This paper is about preserving the Cloud data whose idea is to cure everyday problems with computing. Cloud computing is fundamentally pooling the resources virtually and the resources like storage are provided to the end-users through the web. Information …
Continue reading at www.techrxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Similar Documents

Publication Publication Date Title
Kumar et al. Cloud security using hybrid cryptography algorithms
Waziri et al. Network security in cloud computing with elliptic curve cryptography
Kartit et al. Applying encryption algorithm for data security in cloud storage
Seth et al. Hybrid homomorphic encryption scheme for secure cloud data storage
Alowolodu et al. Elliptic curve cryptography for securing cloud computing applications
Alemami et al. Cloud data security and various cryptographic algorithms
Gupta et al. Compendium of data security in cloud storage by applying hybridization of encryption algorithm
Agarwal et al. A survey on cloud computing security issues and cryptographic techniques
Chidambaram et al. Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
Ahmad et al. Assessment on potential security threats and introducing novel data security model in cloud environment
CN113918982B (en) Data processing method and system based on identification information
Ogunleye et al. Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment
Tyagi et al. Cloud data security and various security algorithms
Hlaing et al. Secure One Time Password OTP Generation for user Authentication in Cloud Environment
US10892892B1 (en) Method and apparatus for end-to-end secure sharing of information with multiple recipients without maintaining a key directory
Tripathy et al. Rivest cipher 4 cryptography and elliptical curve cryptography techniques to secure data in cloud
Madni et al. Security Model for Securing Data on Cloud
Gupta et al. Data Security in Distributed Environments
Srilakshmi et al. Cloud computing security using cryptographic algorithms
Goyal et al. MD5 and ECC Encryption based framework for Cloud Computing Services
Tukkoji Secure Data Storage in Cloud Computing Using Code Based McEliece and NTRU Cryptosystems
Filaly et al. Hybrid Encryption Algorithm for Information Security in Hadoop
Harkude et al. Security in Cloud Computing using Homomorphic Cryptography.
Sharma et al. A case of multilevel security application for ensuring data integrity (prevention and detection) in cloud environment
Akram A study on Role and Applications of Cryptography Techniques in Cloud Computing (Cloud Cryptography)