Almtrf et al., 2019 - Google Patents
Framework modeling for User privacy in cloud computingAlmtrf et al., 2019
View PDF- Document ID
- 6177955078390230958
- Author
- Almtrf A
- Alagrash Y
- Zohdy M
- Publication year
- Publication venue
- 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC)
External Links
Snippet
Many organizations around the world recognize the vitality of cloud computing. However, some concerns make organizations reluctant to adopting cloud computing. These include data security, privacy, and trust issues. It is very important that these issues are addressed to …
- 238000005516 engineering process 0 description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Al-Issa et al. | eHealth cloud security challenges: a survey | |
CN110892691B (en) | Secure execution platform cluster | |
Ghorbel et al. | Privacy in cloud computing environments: a survey and research challenges | |
Jouini et al. | A security framework for secure cloud computing environments | |
AU2017201850B2 (en) | Method and system for digital privacy management | |
Pearson et al. | Privacy, security and trust issues arising from cloud computing | |
Ashktorab et al. | Security threats and countermeasures in cloud computing | |
Kalloniatis et al. | Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts | |
Kaaniche et al. | Security SLA based monitoring in clouds | |
Ahuja et al. | A survey of the state of cloud security | |
Dinadayalan et al. | Data security issues in cloud environment and solutions | |
Shakir et al. | Literature review of security issues in saas for public cloud computing: a meta-analysis | |
Chimakurthi | Cloud Security-A Semantic Approach in End to End Security Compliance | |
Jouini et al. | Surveying and analyzing security problems in cloud computing environments | |
Almtrf et al. | Framework modeling for User privacy in cloud computing | |
Robinson | Insights on cloud security management | |
Weil | Taking compliance to the cloud—Using ISO standards (tools and techniques) | |
Aggarwal et al. | Cloud computing: data storage security analysis and its challenges | |
Rai et al. | Study of security risk and vulnerabilities of cloud computing | |
Basson | The right to privacy: how the proposed POPI Bill will impact data security in a Cloud Computing environment | |
Hasimi | Cost-effective solutions in cloud computing security | |
Del Mar López Ruiz et al. | Privacy risks in cloud computing | |
Rajvanshi et al. | Data Protection in Cloud Computing | |
Khan | Data confidentiality and risk management in Cloud Computing | |
Georgiou et al. | Security and Privacy Issues for Intelligent Cloud-Based Health Systems |