Nothing Special   »   [go: up one dir, main page]

Bandanadam et al., 2022 - Google Patents

A methodical literature survey on block chain-based public auditing in cloud: analysis on performance and door towards future scope

Bandanadam et al., 2022

Document ID
16561112904814178738
Author
Bandanadam S
Kumar R
Publication year
Publication venue
2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC)

External Links

Snippet

Cloud computing does an efficient program to offer and manage the resources owed to statistics and communication approaches for remote users. It exploits features of virtualization approaches over a number of shared resources like services, computing …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Liang et al. PDPChain: A consortium blockchain-based privacy protection scheme for personal data
Wang et al. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems
Yang et al. A zero-knowledge-proof-based digital identity management scheme in blockchain
Yu et al. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Yang et al. Provable data possession of resource-constrained mobile devices in cloud computing
Awadallah et al. An integrated architecture for maintaining security in cloud computing based on blockchain
JP2012518330A (en) Reliable cloud computing and cloud service framework
Yan et al. Integrity audit of shared cloud data with identity tracking
Li et al. A Blockchain‐Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors
Hariharasitaraman et al. A dynamic data security mechanism based on position aware Merkle tree for health rehabilitation services over cloud
Zhu et al. Secure collaborative integrity verification for hybrid cloud environments
Gowda et al. BPCPR-FC: blockchain-based privacy preservation with confidentiality using proxy reencryption and ring signature in fog computing environments
Shin et al. A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage.
Mishra et al. Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation
Xie et al. A novel blockchain-based and proxy-oriented public audit scheme for low performance terminal devices
Yan et al. Efficient Privacy‐Preserving Certificateless Public Auditing of Data in Cloud Storage
Kokoris-Kogias et al. Verifiable management of private data under byzantine failures
Wu et al. The survey on the development of secure multi-party computing in the blockchain
Cui et al. Towards Multi-User, Secure, and Verifiable $ k $ NN Query in Cloud Database
Wei et al. Dynamic data integrity auditing for secure outsourcing in the cloud
Thilagavathy et al. A novel framework paradigm for EMR management cloud system authentication using blockchain security network
Tang et al. A secure and lightweight cloud data deduplication scheme with efficient access control and key management
Zhou et al. A Scalable Blockchain‐Based Integrity Verification Scheme
Song et al. Enabling transparent deduplication and auditing for encrypted data in cloud
Bandanadam et al. A methodical literature survey on block chain-based public auditing in cloud: analysis on performance and door towards future scope