Rosy, 2016 - Google Patents
AN INVESTIGATION OF SECURITY CONCERNS FOR CLOUD COMPUTINGRosy, 2016
View PDF- Document ID
- 14811351615013479861
- Author
- Rosy J
- Publication year
- Publication venue
- Journal of Recent Research in Engineering and Technology
External Links
Snippet
Cloud computing is a well-known revolution technology in information technology (IT) industry because of its performance, accessibility, low cost and many other luxuries. Cloud computing has been envisioned as the next generation architecture of IT enterprise. Cloud …
- 238000009114 investigational therapy 0 title description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhardwaj et al. | Security algorithms for cloud computing | |
Zhao et al. | Trusted data sharing over untrusted cloud storage providers | |
Barker et al. | Guideline for using cryptographic standards in the federal government: Cryptographic mechanisms | |
Nunez et al. | Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services | |
Velliangiri et al. | An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography | |
Pradeep et al. | An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment | |
Sugumaran et al. | An architecture for data security in cloud computing | |
Ahmad et al. | Hybrid cryptography algorithms in cloud computing: A review | |
Kumar et al. | Data outsourcing: A threat to confidentiality, integrity, and availability | |
Azougaghe et al. | An efficient algorithm for data security in cloud storage | |
MOHAMMED et al. | A symmetric-based framework for securing cloud data at rest | |
Bangar et al. | Study and comparison of cryptographic methods for cloud security | |
Kumar | DecenCrypto cloud: decentralized cryptography technique for secure communication over the clouds | |
Altarawneh | A strong combination of cryptographic techniques to secure cloud-hosted data | |
Rosy | AN INVESTIGATION OF SECURITY CONCERNS FOR CLOUD COMPUTING | |
Shakor et al. | Hybrid security model for medical image protection in cloud | |
Kaur | A Novel Technique of Data Security in Cloud Computing based on Blowfish with MD5 method | |
SATHEESH et al. | A NOVEL HARDWARE PARAMETERS BASED CLOUD DATA ENCRYPTION AND DECRYPTION AGAINST UNAUTHORIZED USERS. | |
Zkik et al. | A New Authentication and Homomorphic Encryption as a Service Model for Preserving Privacy in Clouds. | |
Toğay | A practical key agreement scheme for videoconferencing | |
Medhioub et al. | An identity-based cryptographic scheme for cloud storage applications | |
Das et al. | Data privacy preservation using aes-gcm encryption in Heroku cloud | |
Attia et al. | E-mail systems in cloud computing environment privacy, trust and security challenges | |
Negi et al. | A Hybrid Cryptographic Approach for Secure Cloud-Based File Storage | |
Lu et al. | Research on Data Security and Encryption Technology in Network Transmission |