Nothing Special   »   [go: up one dir, main page]

Chavali et al., 2014 - Google Patents

Data sharing using cloud information accountability framework

Chavali et al., 2014

View PDF
Document ID
9436456031401583252
Author
Chavali C
Koyi L
Kumar C
Rao N
Publication year
Publication venue
International Journal of Engineering Research and Applications

External Links

Snippet

Abstract Cloud Information Accountability (CIA) framework, based on the notion of information accountability. Unlike privacy protection technologies, information accountability focuses on keeping the data usage transparent and traceable. Our proposed CIA framework …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer

Similar Documents

Publication Publication Date Title
KR102055116B1 (en) Data security service
Sundareswaran et al. Ensuring distributed accountability for data sharing in the cloud
Nunez et al. Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services
Sandikkaya et al. Security problems of platform-as-a-service (paas) clouds and practical solutions to the problems
Kalaiprasath et al. Cloud information accountability (cia) framework ensuring accountability of data in cloud and security in end to end process in cloud terminology
Osman et al. Proposed security model for web based applications and services
Junghanns et al. Engineering of secure multi-cloud storage
Bingu et al. A comprehensive review on security and privacy preservation in cloud environment
Yang et al. Ensuring reliable logging for data accountability in untrusted cloud storage
Kumagai et al. Distributed Public Key Certificate‐Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology
Aljahdali et al. Efficient and Secure Access Control for IoT-based Environmental Monitoring
Adlam et al. Applying Blockchain Technology to Security-Related Aspects of Electronic Healthcare Record Infrastructure
Chavali et al. Data sharing using cloud information accountability framework
Heames et al. Notice of Violation of IEEE Publication Principles: DAta accountability in cloud using reliable log files forwarding
RANI et al. Ensuring Distributed Accountability for Data Sharing in the Cloud
Kediya et al. Blockchain and Proxy ReEncryption Technology Based Financial Data Sharing Solution
Rajani et al. Integrity verification & distributed accountability in high performance distributed clouds
Zheng et al. A survey on cloud accountability
Vanitha et al. Data sharing: Efficient distributed accountability in cloud using third party auditor
Cinque et al. Secure crisis information sharing through an interoperability framework among first responders: The SECTOR practical experience
Sathana et al. Three level security system for dynamic group in cloud
Balamurugan et al. Data Security and Cryptography in Cloud Environment
Neela DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract‐Based Access Control, and Hash Authentication Codes for Cloud Security
Aldarwish et al. FOG ENABLED PRIVATE BLOCKCHAIN-BASED IDENTITY AUTHENTICATION SCHEME FOR OIL AND GAS FIELD MONITORING.
VARUN Dual Access Control for Cloud-Based Data Storage and Sharing