[go: up one dir, main page]

Vijayapriya, 2013 - Google Patents

Security algorithm in cloud computing: overview

Vijayapriya, 2013

View PDF
Document ID
1118971598616628999
Author
Vijayapriya M
Publication year
Publication venue
International Journal of Computer Science & Engineering Technology (IJCSET)

External Links

Snippet

Network security is becoming more and more important as people spend more and more time connected. It is a specialized field in computer networking that involves securing a computer network infrastructure. It is typically handled by a network administrator or system …
Continue reading at www.ijcset.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Kumar et al. Cloud security using hybrid cryptography algorithms
Kaur et al. Analysis of security algorithms in cloud computing
Yang et al. Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud
Kartit et al. Applying encryption algorithm for data security in cloud storage
Kartit et al. Applying Encryption Algorithm to Enhance Data Security in Cloud Storage.
Pawar et al. Providing security and integrity for data stored in cloud storage
Mendonca Data security in cloud using AES
Vijayapriya Security algorithm in cloud computing: overview
Tyagi et al. Cloud data security and various security algorithms
Ponnuramu et al. Secured storage for dynamic data in cloud
Thiyagarajan et al. Data integrity and security in cloud environment using AES algorithm
Shahzad Safe haven in the cloud: Secure access controlled file encryption (safe) system
Grover et al. A framework for cloud data security
Santhisri et al. Comparative study on various security algorithms in cloud computing
Kulshrestha et al. A comprehensive evaluation of cryptographic algorithms in cloud computing
Patil et al. Towards secure and dependable storage services in cloud computing
Chavan et al. Secure CRM cloud service using RC5 algorithm
Hashemi DATA STORAGESECURITY CHALLENGESIN CLOUD COMPUTING
Mahmood Data security protection in cloud computing by using encryption
Sreenivas et al. Enhancing the security for information with virtual data centers in cloud
Kaur et al. Enhancement in homomorphic encryption scheme for cloud data security
Desarkar et al. Encryption Algorithm for Data Security in Cloud Computing
Bhagat et al. Addressing techniques for secure data sharing in cloud
KL et al. Data storage lock algorithm with cryptographic techniques.
Sudha Data Security in cloud service providers-a Comparison of different cryptographic methods