Gupta et al., 2023 - Google Patents
Compendium of data security in cloud storage by applying hybridization of encryption algorithmGupta et al., 2023
View PDF- Document ID
- 2346496876294160801
- Author
- Gupta I
- Gurnani D
- Gupta N
- Singla C
- Thakral P
- Singh A
- Publication year
- Publication venue
- Authorea Preprints
External Links
Snippet
This paper is about preserving the Cloud data whose idea is to cure everyday problems with computing. Cloud computing is fundamentally pooling the resources virtually and the resources like storage are provided to the end-users through the web. Information …
- 238000004422 calculation algorithm 0 title description 32
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | Cloud security using hybrid cryptography algorithms | |
Waziri et al. | Network security in cloud computing with elliptic curve cryptography | |
Kartit et al. | Applying encryption algorithm for data security in cloud storage | |
Seth et al. | Hybrid homomorphic encryption scheme for secure cloud data storage | |
Alowolodu et al. | Elliptic curve cryptography for securing cloud computing applications | |
Alemami et al. | Cloud data security and various cryptographic algorithms | |
Gupta et al. | Compendium of data security in cloud storage by applying hybridization of encryption algorithm | |
Agarwal et al. | A survey on cloud computing security issues and cryptographic techniques | |
Chidambaram et al. | Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique | |
Ahmad et al. | Assessment on potential security threats and introducing novel data security model in cloud environment | |
CN113918982B (en) | Data processing method and system based on identification information | |
Tyagi et al. | Cloud data security and various security algorithms | |
Ogunleye et al. | Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment | |
Hlaing et al. | Secure One Time Password OTP Generation for user Authentication in Cloud Environment | |
US10892892B1 (en) | Method and apparatus for end-to-end secure sharing of information with multiple recipients without maintaining a key directory | |
Tripathy et al. | Rivest cipher 4 cryptography and elliptical curve cryptography techniques to secure data in cloud | |
Madni et al. | Security Model for Securing Data on Cloud | |
Gupta et al. | Data Security in Distributed Environments | |
Srilakshmi et al. | Cloud computing security using cryptographic algorithms | |
Goyal et al. | MD5 and ECC Encryption based framework for Cloud Computing Services | |
Tukkoji | Secure Data Storage in Cloud Computing Using Code Based McEliece and NTRU Cryptosystems | |
Filaly et al. | Hybrid Encryption Algorithm for Information Security in Hadoop | |
Harkude et al. | Security in Cloud Computing using Homomorphic Cryptography. | |
Sharma et al. | A case of multilevel security application for ensuring data integrity (prevention and detection) in cloud environment | |
Akram | A study on Role and Applications of Cryptography Techniques in Cloud Computing (Cloud Cryptography) |