Nothing Special   »   [go: up one dir, main page]

Soman et al., 2021 - Google Patents

Analysis of hybrid data security algorithms for cloud

Soman et al., 2021

View PDF
Document ID
6361775228780186099
Author
Soman V
Natarajan V
Publication year
Publication venue
Second International Conference on Networks and Advances in Computational Technologies: NetACT 19

External Links

Snippet

Security of data before adopting into the cloud is important because of the security challenges in clouds. The data security of the cloud server must be analyzed before implementing new security features. The data of the cloud owner have problems of attacks …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Similar Documents

Publication Publication Date Title
Kumar et al. Cloud security using hybrid cryptography algorithms
Garg et al. Comparative analysis of cloud data integrity auditing protocols
Sugumaran et al. An architecture for data security in cloud computing
Agarwal et al. A survey on cloud computing security issues and cryptographic techniques
Kulkarni et al. Security frameworks for mobile cloud computing: A survey
Bhandari et al. A framework for data security and storage in Cloud Computing
Kumar et al. Data outsourcing: A threat to confidentiality, integrity, and availability
Azougaghe et al. An efficient algorithm for data security in cloud storage
MOHAMMED et al. A symmetric-based framework for securing cloud data at rest
Bangar et al. Study and comparison of cryptographic methods for cloud security
Thangavel et al. An analysis of privacy preservation schemes in cloud computing
Ponnuramu et al. Secured storage for dynamic data in cloud
Tyagi et al. Analysis and Implementation of AES and RSA for cloud
Soman et al. Analysis of hybrid data security algorithms for cloud
Mahmood et al. Data security protection in cloud using encryption and authentication
Pilla et al. A new authentication protocol for hardware-based authentication systems in an iot environment
Salem et al. An efficient privacy preserving public auditing mechanism for secure cloud storage
Kulkarni et al. A Study on Data Security in Cloud Computing: Traditional Cryptography to the Quantum Age Cryptography
Kaur et al. Enhancement in homomorphic encryption scheme for cloud data security
Taylor et al. Security approaches and crypto algorithms in mobile cloud storage environment to ensure data security
George et al. Improved multi‐party verification protocol with reduced computational overhead in cloud storage system
Agarwal et al. An efficient and optimised approach for secured file sharing in cloud computing
Jain et al. Improving the security by using various cryptographic techniques in cloud computing
Jain Enhancing security in Tokenization using NGE for storage as a service
Gonthireddy et al. Secure Big Data Deduplication with Dynamic Ownership Management in Cloud Computing