Vijayapriya, 2013 - Google Patents
Security algorithm in cloud computing: overviewVijayapriya, 2013
View PDF- Document ID
- 1118971598616628999
- Author
- Vijayapriya M
- Publication year
- Publication venue
- International Journal of Computer Science & Engineering Technology (IJCSET)
External Links
Snippet
Network security is becoming more and more important as people spend more and more time connected. It is a specialized field in computer networking that involves securing a computer network infrastructure. It is typically handled by a network administrator or system …
- 230000002708 enhancing 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kumar et al. | Cloud security using hybrid cryptography algorithms | |
| Kaur et al. | Analysis of security algorithms in cloud computing | |
| Yang et al. | Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud | |
| Kartit et al. | Applying encryption algorithm for data security in cloud storage | |
| Kartit et al. | Applying Encryption Algorithm to Enhance Data Security in Cloud Storage. | |
| Pawar et al. | Providing security and integrity for data stored in cloud storage | |
| Mendonca | Data security in cloud using AES | |
| Vijayapriya | Security algorithm in cloud computing: overview | |
| Tyagi et al. | Cloud data security and various security algorithms | |
| Ponnuramu et al. | Secured storage for dynamic data in cloud | |
| Thiyagarajan et al. | Data integrity and security in cloud environment using AES algorithm | |
| Shahzad | Safe haven in the cloud: Secure access controlled file encryption (safe) system | |
| Grover et al. | A framework for cloud data security | |
| Santhisri et al. | Comparative study on various security algorithms in cloud computing | |
| Kulshrestha et al. | A comprehensive evaluation of cryptographic algorithms in cloud computing | |
| Patil et al. | Towards secure and dependable storage services in cloud computing | |
| Chavan et al. | Secure CRM cloud service using RC5 algorithm | |
| Hashemi | DATA STORAGESECURITY CHALLENGESIN CLOUD COMPUTING | |
| Mahmood | Data security protection in cloud computing by using encryption | |
| Sreenivas et al. | Enhancing the security for information with virtual data centers in cloud | |
| Kaur et al. | Enhancement in homomorphic encryption scheme for cloud data security | |
| Desarkar et al. | Encryption Algorithm for Data Security in Cloud Computing | |
| Bhagat et al. | Addressing techniques for secure data sharing in cloud | |
| KL et al. | Data storage lock algorithm with cryptographic techniques. | |
| Sudha | Data Security in cloud service providers-a Comparison of different cryptographic methods |