Soman et al., 2021 - Google Patents
Analysis of hybrid data security algorithms for cloudSoman et al., 2021
View PDF- Document ID
- 6361775228780186099
- Author
- Soman V
- Natarajan V
- Publication year
- Publication venue
- Second International Conference on Networks and Advances in Computational Technologies: NetACT 19
External Links
Snippet
Security of data before adopting into the cloud is important because of the security challenges in clouds. The data security of the cloud server must be analyzed before implementing new security features. The data of the cloud owner have problems of attacks …
- 238000004458 analytical method 0 title description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | Cloud security using hybrid cryptography algorithms | |
Garg et al. | Comparative analysis of cloud data integrity auditing protocols | |
Sugumaran et al. | An architecture for data security in cloud computing | |
Agarwal et al. | A survey on cloud computing security issues and cryptographic techniques | |
Kulkarni et al. | Security frameworks for mobile cloud computing: A survey | |
Bhandari et al. | A framework for data security and storage in Cloud Computing | |
Kumar et al. | Data outsourcing: A threat to confidentiality, integrity, and availability | |
Azougaghe et al. | An efficient algorithm for data security in cloud storage | |
MOHAMMED et al. | A symmetric-based framework for securing cloud data at rest | |
Bangar et al. | Study and comparison of cryptographic methods for cloud security | |
Thangavel et al. | An analysis of privacy preservation schemes in cloud computing | |
Ponnuramu et al. | Secured storage for dynamic data in cloud | |
Tyagi et al. | Analysis and Implementation of AES and RSA for cloud | |
Soman et al. | Analysis of hybrid data security algorithms for cloud | |
Mahmood et al. | Data security protection in cloud using encryption and authentication | |
Pilla et al. | A new authentication protocol for hardware-based authentication systems in an iot environment | |
Salem et al. | An efficient privacy preserving public auditing mechanism for secure cloud storage | |
Kulkarni et al. | A Study on Data Security in Cloud Computing: Traditional Cryptography to the Quantum Age Cryptography | |
Kaur et al. | Enhancement in homomorphic encryption scheme for cloud data security | |
Taylor et al. | Security approaches and crypto algorithms in mobile cloud storage environment to ensure data security | |
George et al. | Improved multi‐party verification protocol with reduced computational overhead in cloud storage system | |
Agarwal et al. | An efficient and optimised approach for secured file sharing in cloud computing | |
Jain et al. | Improving the security by using various cryptographic techniques in cloud computing | |
Jain | Enhancing security in Tokenization using NGE for storage as a service | |
Gonthireddy et al. | Secure Big Data Deduplication with Dynamic Ownership Management in Cloud Computing |