Sanka et al., 2010 - Google Patents
Secure data access in cloud computingSanka et al., 2010
- Document ID
- 8409200747341878722
- Author
- Sanka S
- Hota C
- Rajarajan M
- Publication year
- Publication venue
- 2010 IEEE 4th international conference on internet multimedia services architecture and application
External Links
Snippet
Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and …
- 238000000034 method 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sanka et al. | Secure data access in cloud computing | |
| Hota et al. | Capability-based cryptographic data access control in cloud computing | |
| Ali et al. | SeDaSC: secure data sharing in clouds | |
| Zhao et al. | Trusted data sharing over untrusted cloud storage providers | |
| Pradeep et al. | An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment | |
| Saroj et al. | Threshold cryptography based data security in cloud computing | |
| Nunez et al. | Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services | |
| CN108111540B (en) | Hierarchical access control system and method supporting data sharing in cloud storage | |
| Che Fauzi et al. | On cloud computing security issues | |
| Sharma et al. | A hybrid cryptographic technique for file storage mechanism over cloud | |
| Athena et al. | Survey on public key cryptography scheme for securing data in cloud computing | |
| Zawoad et al. | Secprov: Trustworthy and efficient provenance management in the cloud | |
| MOHAMMED et al. | A symmetric-based framework for securing cloud data at rest | |
| Lee et al. | Time‐bound key‐aggregate encryption for cloud storage | |
| Castiglione et al. | A secure file sharing service for distributed computing environments | |
| Pervez et al. | SAPDS: self-healing attribute-based privacy aware data sharing in cloud | |
| Bokhari et al. | Evaluation of hybrid encryption technique to secure data during transmission in cloud computing | |
| Kumar et al. | ASP: advanced security protocol for security and privacy in cloud computing | |
| Pervez et al. | Oblivious access control policies for cloud based data sharing systems | |
| Purushothama et al. | Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud | |
| Chavan et al. | Secure CRM cloud service using RC5 algorithm | |
| Kaviani et al. | Flock: A Framework for Deploying {On-Demand} Distributed Trust | |
| Liu et al. | A secure and efficient data sharing framework with delegated capabilities in hybrid cloud | |
| Zhou et al. | Sds2: Secure data-sharing scheme for crowd owners in public cloud service | |
| Wang et al. | Privacy preserving protocol for service aggregation in cloud computing |