Nothing Special   »   [go: up one dir, main page]

Rosy, 2016 - Google Patents

AN INVESTIGATION OF SECURITY CONCERNS FOR CLOUD COMPUTING

Rosy, 2016

View PDF
Document ID
14811351615013479861
Author
Rosy J
Publication year
Publication venue
Journal of Recent Research in Engineering and Technology

External Links

Snippet

Cloud computing is a well-known revolution technology in information technology (IT) industry because of its performance, accessibility, low cost and many other luxuries. Cloud computing has been envisioned as the next generation architecture of IT enterprise. Cloud …
Continue reading at scholar.archive.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Similar Documents

Publication Publication Date Title
Bhardwaj et al. Security algorithms for cloud computing
Zhao et al. Trusted data sharing over untrusted cloud storage providers
Barker et al. Guideline for using cryptographic standards in the federal government: Cryptographic mechanisms
Nunez et al. Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services
Velliangiri et al. An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography
Pradeep et al. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
Sugumaran et al. An architecture for data security in cloud computing
Ahmad et al. Hybrid cryptography algorithms in cloud computing: A review
Kumar et al. Data outsourcing: A threat to confidentiality, integrity, and availability
Azougaghe et al. An efficient algorithm for data security in cloud storage
MOHAMMED et al. A symmetric-based framework for securing cloud data at rest
Bangar et al. Study and comparison of cryptographic methods for cloud security
Kumar DecenCrypto cloud: decentralized cryptography technique for secure communication over the clouds
Altarawneh A strong combination of cryptographic techniques to secure cloud-hosted data
Rosy AN INVESTIGATION OF SECURITY CONCERNS FOR CLOUD COMPUTING
Shakor et al. Hybrid security model for medical image protection in cloud
Kaur A Novel Technique of Data Security in Cloud Computing based on Blowfish with MD5 method
SATHEESH et al. A NOVEL HARDWARE PARAMETERS BASED CLOUD DATA ENCRYPTION AND DECRYPTION AGAINST UNAUTHORIZED USERS.
Zkik et al. A New Authentication and Homomorphic Encryption as a Service Model for Preserving Privacy in Clouds.
Toğay A practical key agreement scheme for videoconferencing
Medhioub et al. An identity-based cryptographic scheme for cloud storage applications
Das et al. Data privacy preservation using aes-gcm encryption in Heroku cloud
Attia et al. E-mail systems in cloud computing environment privacy, trust and security challenges
Negi et al. A Hybrid Cryptographic Approach for Secure Cloud-Based File Storage
Lu et al. Research on Data Security and Encryption Technology in Network Transmission