Bandanadam et al., 2022 - Google Patents
A methodical literature survey on block chain-based public auditing in cloud: analysis on performance and door towards future scopeBandanadam et al., 2022
- Document ID
- 16561112904814178738
- Author
- Bandanadam S
- Kumar R
- Publication year
- Publication venue
- 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC)
External Links
Snippet
Cloud computing does an efficient program to offer and manage the resources owed to statistics and communication approaches for remote users. It exploits features of virtualization approaches over a number of shared resources like services, computing …
- 238000004458 analytical method 0 title abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liang et al. | PDPChain: A consortium blockchain-based privacy protection scheme for personal data | |
Wang et al. | A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems | |
Yang et al. | A zero-knowledge-proof-based digital identity management scheme in blockchain | |
Yu et al. | Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage | |
Yang et al. | Provable data possession of resource-constrained mobile devices in cloud computing | |
Awadallah et al. | An integrated architecture for maintaining security in cloud computing based on blockchain | |
JP2012518330A (en) | Reliable cloud computing and cloud service framework | |
Yan et al. | Integrity audit of shared cloud data with identity tracking | |
Li et al. | A Blockchain‐Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors | |
Hariharasitaraman et al. | A dynamic data security mechanism based on position aware Merkle tree for health rehabilitation services over cloud | |
Zhu et al. | Secure collaborative integrity verification for hybrid cloud environments | |
Gowda et al. | BPCPR-FC: blockchain-based privacy preservation with confidentiality using proxy reencryption and ring signature in fog computing environments | |
Shin et al. | A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage. | |
Mishra et al. | Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation | |
Xie et al. | A novel blockchain-based and proxy-oriented public audit scheme for low performance terminal devices | |
Yan et al. | Efficient Privacy‐Preserving Certificateless Public Auditing of Data in Cloud Storage | |
Kokoris-Kogias et al. | Verifiable management of private data under byzantine failures | |
Wu et al. | The survey on the development of secure multi-party computing in the blockchain | |
Cui et al. | Towards Multi-User, Secure, and Verifiable $ k $ NN Query in Cloud Database | |
Wei et al. | Dynamic data integrity auditing for secure outsourcing in the cloud | |
Thilagavathy et al. | A novel framework paradigm for EMR management cloud system authentication using blockchain security network | |
Tang et al. | A secure and lightweight cloud data deduplication scheme with efficient access control and key management | |
Zhou et al. | A Scalable Blockchain‐Based Integrity Verification Scheme | |
Song et al. | Enabling transparent deduplication and auditing for encrypted data in cloud | |
Bandanadam et al. | A methodical literature survey on block chain-based public auditing in cloud: analysis on performance and door towards future scope |