Afshan, 2017 - Google Patents
Analysis and Assessment of the Vulnerabilities in Cloud Computing.Afshan, 2017
View PDF- Document ID
- 8308623235359709187
- Author
- Afshan N
- Publication year
- Publication venue
- International Journal of Advanced Research in Computer Science
External Links
Snippet
The field of cloud computing has become a highly popular means for the smooth provision of various Information Technology (IT)-enabled business services. In today's dynamic and rapidly changing computing era, most of the organizations have chosen it as basic …
- 238000004458 analytical method 0 title description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Iqbal et al. | On cloud security attacks: A taxonomy and intrusion detection and prevention as a service | |
Singh et al. | A survey on cloud computing security: Issues, threats, and solutions | |
US10511436B1 (en) | Protecting key material using white-box cryptography and split key techniques | |
JP6687641B2 (en) | Client device authentication based on entropy from server or other device | |
JP6121049B2 (en) | Secure access to resources using proxies | |
Arora et al. | Cloud security ecosystem for data security and privacy | |
Kumar et al. | A survey on secure cloud: security and privacy in cloud computing | |
US20190312902A1 (en) | Identity based behavior measurement architecture | |
Vladimirov et al. | Security and privacy protection obstacles with 3D reconstructed models of people in applications and the metaverse: A survey | |
Hussein et al. | A survey of cryptography cloud storage techniques | |
Malik et al. | Federated identity management (FIM): Challenges and opportunities | |
Afshan | Analysis and Assessment of the Vulnerabilities in Cloud Computing. | |
Kumar | Cloud computing: threats, attacks and solutions | |
Archana Lisbon et al. | A study on cloud and fog computing security issues and solutions | |
Ennajjar et al. | Security in cloud computing approaches and solutions | |
Kaur et al. | Enhancing Features of Cloud Computing Using Cloud Access Security Brokers to Avoid Data Breaches | |
Locati | OpenStack cloud security | |
Albaroodi et al. | A proposed framework for outsourcing and secure encrypted data on OpenStack object storage (Swift) | |
Chhabra et al. | Cloud computing: towards risk assessment | |
Bennasar et al. | State-of-The-Art of cloud computing cyber-security | |
Salehi et al. | Cloud computing security challenges and its potential solution | |
Kim et al. | Secure user authentication based on the trusted platform for mobile devices | |
Seo et al. | Towards a security-enhanced cloud platform | |
Zou et al. | Cloud-based identity attribute service with privacy protection in Cyberspace | |
Shen et al. | A trusted computing technology enabled mobile agent system |