Al‐Tariq et al., 2017 - Google Patents
A scalable framework for protecting user identity and access pattern in untrusted Web server using forward secrecy, public key encryption and bloom filterAl‐Tariq et al., 2017
- Document ID
- 10671905369367492082
- Author
- Al‐Tariq A
- Kamal A
- Hamid M
- Abdullah‐Al‐Wadud M
- Hassan M
- Rahman S
- Publication year
- Publication venue
- Concurrency and Computation: Practice and Experience
External Links
Snippet
Securing user identity from data breach in a web server is one of the major concerns for the users of the web applications. Similarly, protecting user access pattern from unauthorized access should be taken seriously, because the potential threats such attacks may pose, are …
- 230000002633 protecting 0 title abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Harinath et al. | Enhanced data security and privacy in IoT devices using blockchain technology and quantum cryptography | |
| Ranchal et al. | Protection of identity information in cloud computing without trusted third party | |
| Sriramya et al. | Providing password security by salted password hashing using bcrypt algorithm | |
| Kapil et al. | Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective | |
| Goswami et al. | Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability | |
| Lee | Security basics for computer architects | |
| Khashan | Secure outsourcing and sharing of cloud data using a user-side encrypted file system | |
| CN112242898B (en) | An Encryption Method for Onion Network System Consensus File | |
| Ahamed et al. | Cloud computing: Security and reliability issues | |
| Chen et al. | End-to-same-end encryption: Modularly augmenting an app with an efficient, portable, and blind cloud storage | |
| Das et al. | A decentralized open web cryptographic standard | |
| Bakro et al. | Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms | |
| CN114826702B (en) | Database access password encryption method and device and computer equipment | |
| Castiglione et al. | A secure file sharing service for distributed computing environments | |
| Al‐Tariq et al. | A scalable framework for protecting user identity and access pattern in untrusted Web server using forward secrecy, public key encryption and bloom filter | |
| Elizabeth et al. | A fog based security model for electronic medical records in the cloud database | |
| Farooq et al. | A cryptographic security framework for hybrid Cloud‐Internet of Things network | |
| Rastogi et al. | Secured identity management system for preserving data privacy and transmission in cloud computing | |
| Kapudasu et al. | Network device identity management using cryptography | |
| Siyal et al. | Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security. | |
| Zhang et al. | A secure access control framework for cloud management | |
| Bhatnagar et al. | An empirical study of security issues in grid middleware | |
| Liu et al. | Security analysis and provision of authentication protocol, based on peer-to-peer structure in IOT platform | |
| Shaheen et al. | Fortifying Multi-User Cloud Security in Quantum Networking Using Cryptographic Algorithms | |
| Kumar et al. | Validation Lamina for Maintaining Confidentiality within the Hadoop |