[go: up one dir, main page]

Sanka et al., 2010 - Google Patents

Secure data access in cloud computing

Sanka et al., 2010

Document ID
8409200747341878722
Author
Sanka S
Hota C
Rajarajan M
Publication year
Publication venue
2010 IEEE 4th international conference on internet multimedia services architecture and application

External Links

Snippet

Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
Sanka et al. Secure data access in cloud computing
Hota et al. Capability-based cryptographic data access control in cloud computing
Ali et al. SeDaSC: secure data sharing in clouds
Zhao et al. Trusted data sharing over untrusted cloud storage providers
Pradeep et al. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
Saroj et al. Threshold cryptography based data security in cloud computing
Nunez et al. Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services
CN108111540B (en) Hierarchical access control system and method supporting data sharing in cloud storage
Che Fauzi et al. On cloud computing security issues
Sharma et al. A hybrid cryptographic technique for file storage mechanism over cloud
Athena et al. Survey on public key cryptography scheme for securing data in cloud computing
Zawoad et al. Secprov: Trustworthy and efficient provenance management in the cloud
MOHAMMED et al. A symmetric-based framework for securing cloud data at rest
Lee et al. Time‐bound key‐aggregate encryption for cloud storage
Castiglione et al. A secure file sharing service for distributed computing environments
Pervez et al. SAPDS: self-healing attribute-based privacy aware data sharing in cloud
Bokhari et al. Evaluation of hybrid encryption technique to secure data during transmission in cloud computing
Kumar et al. ASP: advanced security protocol for security and privacy in cloud computing
Pervez et al. Oblivious access control policies for cloud based data sharing systems
Purushothama et al. Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
Chavan et al. Secure CRM cloud service using RC5 algorithm
Kaviani et al. Flock: A Framework for Deploying {On-Demand} Distributed Trust
Liu et al. A secure and efficient data sharing framework with delegated capabilities in hybrid cloud
Zhou et al. Sds2: Secure data-sharing scheme for crowd owners in public cloud service
Wang et al. Privacy preserving protocol for service aggregation in cloud computing