Nothing Special   »   [go: up one dir, main page]

Zawawi et al., 2016 - Google Patents

Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment

Zawawi et al., 2016

View PDF
Document ID
7887814210121720491
Author
Zawawi N
Hamdy M
Ghary R
Tolba M
Publication year
Publication venue
Soft Computing

External Links

Snippet

Data traceability and recovery are very important concerns when moving data to the Cloud. The Enhanced Watermarking Approach for Data Integrity and Non-repudiation in Rational Databases (EWRDN) provides data security means as integrity, secrecy, non-repudiation …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Similar Documents

Publication Publication Date Title
Megouache et al. Ensuring user authentication and data integrity in multi-cloud environment
CN111164948B (en) Managing network security vulnerabilities using blockchain networks
Fabian et al. Collaborative and secure sharing of healthcare data in multi-clouds
US8321688B2 (en) Secure and private backup storage and processing for trusted computing and data services
JP5663083B2 (en) System and method for securing data in motion
EP2396921B1 (en) Trusted cloud computing and services framework
CA3144715A1 (en) Systems and methods for permissioned blockchain infrastructure with fine-grained access control and confidentiality-preserving publish/subscribe messaging
US20100318782A1 (en) Secure and private backup storage and processing for trusted computing and data services
Ghani et al. Issues and challenges in cloud storage architecture: a survey
JP2012518330A (en) Reliable cloud computing and cloud service framework
Guarnizo et al. PDFS: Practical data feed service for smart contracts
Kiraz A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
CN111769956B (en) Service processing method, device, equipment and medium
Yu et al. Data security in cloud computing
WO2011157708A1 (en) Methods and systems for securely handling datasets in computer systems
Zawawi et al. Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment
Chen et al. Cloud service platform of electronic identity in cyberspace
Ghani et al. Cloud storage architecture: research challenges and opportunities
Ramesh et al. Public auditing for shared data with efficient user revocation in the cloud
Thakkar et al. A Privacy-Preserving Framework Using Hyperledger Fabric for EHR Sharing Applications
Bhattacharjee et al. DigiBlock: Digital Self-sovereign Identity on Distributed Ledger based on Blockchain
Chandran et al. Data management issues in cloud integrated computing: A big picture
Liagkou A trustworthy architecture for managing cultural content
George et al. Safest Secure and Consistent Data Services in the Storage of Cloud Computing
Raja et al. Public key based third party auditing system using random masking and bilinear total signature for privacy in public cloud environment