Zawawi et al., 2016 - Google Patents
Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environmentZawawi et al., 2016
View PDF- Document ID
- 7887814210121720491
- Author
- Zawawi N
- Hamdy M
- Ghary R
- Tolba M
- Publication year
- Publication venue
- Soft Computing
External Links
Snippet
Data traceability and recovery are very important concerns when moving data to the Cloud. The Enhanced Watermarking Approach for Data Integrity and Non-repudiation in Rational Databases (EWRDN) provides data security means as integrity, secrecy, non-repudiation …
- 238000011084 recovery 0 title abstract description 44
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Megouache et al. | Ensuring user authentication and data integrity in multi-cloud environment | |
CN111164948B (en) | Managing network security vulnerabilities using blockchain networks | |
Fabian et al. | Collaborative and secure sharing of healthcare data in multi-clouds | |
US8321688B2 (en) | Secure and private backup storage and processing for trusted computing and data services | |
JP5663083B2 (en) | System and method for securing data in motion | |
EP2396921B1 (en) | Trusted cloud computing and services framework | |
CA3144715A1 (en) | Systems and methods for permissioned blockchain infrastructure with fine-grained access control and confidentiality-preserving publish/subscribe messaging | |
US20100318782A1 (en) | Secure and private backup storage and processing for trusted computing and data services | |
Ghani et al. | Issues and challenges in cloud storage architecture: a survey | |
JP2012518330A (en) | Reliable cloud computing and cloud service framework | |
Guarnizo et al. | PDFS: Practical data feed service for smart contracts | |
Kiraz | A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing | |
CN111769956B (en) | Service processing method, device, equipment and medium | |
Yu et al. | Data security in cloud computing | |
WO2011157708A1 (en) | Methods and systems for securely handling datasets in computer systems | |
Zawawi et al. | Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment | |
Chen et al. | Cloud service platform of electronic identity in cyberspace | |
Ghani et al. | Cloud storage architecture: research challenges and opportunities | |
Ramesh et al. | Public auditing for shared data with efficient user revocation in the cloud | |
Thakkar et al. | A Privacy-Preserving Framework Using Hyperledger Fabric for EHR Sharing Applications | |
Bhattacharjee et al. | DigiBlock: Digital Self-sovereign Identity on Distributed Ledger based on Blockchain | |
Chandran et al. | Data management issues in cloud integrated computing: A big picture | |
Liagkou | A trustworthy architecture for managing cultural content | |
George et al. | Safest Secure and Consistent Data Services in the Storage of Cloud Computing | |
Raja et al. | Public key based third party auditing system using random masking and bilinear total signature for privacy in public cloud environment |