[go: up one dir, main page]

Al‐Tariq et al., 2017 - Google Patents

A scalable framework for protecting user identity and access pattern in untrusted Web server using forward secrecy, public key encryption and bloom filter

Al‐Tariq et al., 2017

Document ID
10671905369367492082
Author
Al‐Tariq A
Kamal A
Hamid M
Abdullah‐Al‐Wadud M
Hassan M
Rahman S
Publication year
Publication venue
Concurrency and Computation: Practice and Experience

External Links

Snippet

Securing user identity from data breach in a web server is one of the major concerns for the users of the web applications. Similarly, protecting user access pattern from unauthorized access should be taken seriously, because the potential threats such attacks may pose, are …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
Harinath et al. Enhanced data security and privacy in IoT devices using blockchain technology and quantum cryptography
Ranchal et al. Protection of identity information in cloud computing without trusted third party
Sriramya et al. Providing password security by salted password hashing using bcrypt algorithm
Kapil et al. Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective
Goswami et al. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability
Lee Security basics for computer architects
Khashan Secure outsourcing and sharing of cloud data using a user-side encrypted file system
CN112242898B (en) An Encryption Method for Onion Network System Consensus File
Ahamed et al. Cloud computing: Security and reliability issues
Chen et al. End-to-same-end encryption: Modularly augmenting an app with an efficient, portable, and blind cloud storage
Das et al. A decentralized open web cryptographic standard
Bakro et al. Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms
CN114826702B (en) Database access password encryption method and device and computer equipment
Castiglione et al. A secure file sharing service for distributed computing environments
Al‐Tariq et al. A scalable framework for protecting user identity and access pattern in untrusted Web server using forward secrecy, public key encryption and bloom filter
Elizabeth et al. A fog based security model for electronic medical records in the cloud database
Farooq et al. A cryptographic security framework for hybrid Cloud‐Internet of Things network
Rastogi et al. Secured identity management system for preserving data privacy and transmission in cloud computing
Kapudasu et al. Network device identity management using cryptography
Siyal et al. Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security.
Zhang et al. A secure access control framework for cloud management
Bhatnagar et al. An empirical study of security issues in grid middleware
Liu et al. Security analysis and provision of authentication protocol, based on peer-to-peer structure in IOT platform
Shaheen et al. Fortifying Multi-User Cloud Security in Quantum Networking Using Cryptographic Algorithms
Kumar et al. Validation Lamina for Maintaining Confidentiality within the Hadoop