Nothing Special   »   [go: up one dir, main page]

Almtrf et al., 2019 - Google Patents

Framework modeling for User privacy in cloud computing

Almtrf et al., 2019

View PDF
Document ID
6177955078390230958
Author
Almtrf A
Alagrash Y
Zohdy M
Publication year
Publication venue
2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC)

External Links

Snippet

Many organizations around the world recognize the vitality of cloud computing. However, some concerns make organizations reluctant to adopting cloud computing. These include data security, privacy, and trust issues. It is very important that these issues are addressed to …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Al-Issa et al. eHealth cloud security challenges: a survey
CN110892691B (en) Secure execution platform cluster
Ghorbel et al. Privacy in cloud computing environments: a survey and research challenges
Jouini et al. A security framework for secure cloud computing environments
AU2017201850B2 (en) Method and system for digital privacy management
Pearson et al. Privacy, security and trust issues arising from cloud computing
Ashktorab et al. Security threats and countermeasures in cloud computing
Kalloniatis et al. Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
Kaaniche et al. Security SLA based monitoring in clouds
Ahuja et al. A survey of the state of cloud security
Dinadayalan et al. Data security issues in cloud environment and solutions
Shakir et al. Literature review of security issues in saas for public cloud computing: a meta-analysis
Chimakurthi Cloud Security-A Semantic Approach in End to End Security Compliance
Jouini et al. Surveying and analyzing security problems in cloud computing environments
Almtrf et al. Framework modeling for User privacy in cloud computing
Robinson Insights on cloud security management
Weil Taking compliance to the cloud—Using ISO standards (tools and techniques)
Aggarwal et al. Cloud computing: data storage security analysis and its challenges
Rai et al. Study of security risk and vulnerabilities of cloud computing
Basson The right to privacy: how the proposed POPI Bill will impact data security in a Cloud Computing environment
Hasimi Cost-effective solutions in cloud computing security
Del Mar López Ruiz et al. Privacy risks in cloud computing
Rajvanshi et al. Data Protection in Cloud Computing
Khan Data confidentiality and risk management in Cloud Computing
Georgiou et al. Security and Privacy Issues for Intelligent Cloud-Based Health Systems