Chavali et al., 2014 - Google Patents
Data sharing using cloud information accountability frameworkChavali et al., 2014
View PDF- Document ID
- 9436456031401583252
- Author
- Chavali C
- Koyi L
- Kumar C
- Rao N
- Publication year
- Publication venue
- International Journal of Engineering Research and Applications
External Links
Snippet
Abstract Cloud Information Accountability (CIA) framework, based on the notion of information accountability. Unlike privacy protection technologies, information accountability focuses on keeping the data usage transparent and traceable. Our proposed CIA framework …
- 238000000034 method 0 description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102055116B1 (en) | Data security service | |
Sundareswaran et al. | Ensuring distributed accountability for data sharing in the cloud | |
Nunez et al. | Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services | |
Sandikkaya et al. | Security problems of platform-as-a-service (paas) clouds and practical solutions to the problems | |
Kalaiprasath et al. | Cloud information accountability (cia) framework ensuring accountability of data in cloud and security in end to end process in cloud terminology | |
Osman et al. | Proposed security model for web based applications and services | |
Junghanns et al. | Engineering of secure multi-cloud storage | |
Bingu et al. | A comprehensive review on security and privacy preservation in cloud environment | |
Yang et al. | Ensuring reliable logging for data accountability in untrusted cloud storage | |
Kumagai et al. | Distributed Public Key Certificate‐Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology | |
Aljahdali et al. | Efficient and Secure Access Control for IoT-based Environmental Monitoring | |
Adlam et al. | Applying Blockchain Technology to Security-Related Aspects of Electronic Healthcare Record Infrastructure | |
Chavali et al. | Data sharing using cloud information accountability framework | |
Heames et al. | Notice of Violation of IEEE Publication Principles: DAta accountability in cloud using reliable log files forwarding | |
RANI et al. | Ensuring Distributed Accountability for Data Sharing in the Cloud | |
Kediya et al. | Blockchain and Proxy ReEncryption Technology Based Financial Data Sharing Solution | |
Rajani et al. | Integrity verification & distributed accountability in high performance distributed clouds | |
Zheng et al. | A survey on cloud accountability | |
Vanitha et al. | Data sharing: Efficient distributed accountability in cloud using third party auditor | |
Cinque et al. | Secure crisis information sharing through an interoperability framework among first responders: The SECTOR practical experience | |
Sathana et al. | Three level security system for dynamic group in cloud | |
Balamurugan et al. | Data Security and Cryptography in Cloud Environment | |
Neela | DSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract‐Based Access Control, and Hash Authentication Codes for Cloud Security | |
Aldarwish et al. | FOG ENABLED PRIVATE BLOCKCHAIN-BASED IDENTITY AUTHENTICATION SCHEME FOR OIL AND GAS FIELD MONITORING. | |
VARUN | Dual Access Control for Cloud-Based Data Storage and Sharing |