[go: up one dir, main page]

Mahalakshmi, 2017 - Google Patents

Assessment on security issues and classification in cloud computing

Mahalakshmi, 2017

View PDF
Document ID
10222853022093615853
Author
Mahalakshmi B
Publication year
Publication venue
Assessment

External Links

Snippet

In the cloud environment, security and privacy becomes a major concern to be addressed and it should be reliable and truthful. Likewise cloud computing is one among them where the data is outsourced to some third party cloud providers for providing service to the user in …
Continue reading at ijirase.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
Islam et al. A classification and characterization of security threats in cloud computing
Barona et al. A survey on data breach challenges in cloud computing security: Issues and threats
Jouini et al. A security framework for secure cloud computing environments
Alhenaki et al. A survey on the security of cloud computing
Modi et al. A survey on security issues and solutions at different layers of Cloud computing
An et al. Reviews on security issues and challenges in cloud computing
Popoola et al. Ransomware: Current trend, challenges, and research directions
Mishra et al. Security threats and recent countermeasures in cloud computing
Gupta et al. Taxonomy of cloud security
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
Bokhari et al. Security and privacy issues in cloud computing
Jouini et al. Surveying and analyzing security problems in cloud computing environments
Chimakurthi Cloud Security-A Semantic Approach in End to End Security Compliance
Shajan et al. Survey of security threats and countermeasures in cloud computing
Kumar et al. A survey on cloud computing security threats and vulnerabilities
Morovati et al. A network based document management model to prevent data extrusion
Hashemi et al. Taxonomy of the security aspects of cloud computing systems-a survey
Patil Madhubala Survey on security concerns in Cloud computing
Kofahi et al. Identifying the top threats in cloud computing and its suggested solutions: a survey
Malomo et al. A survey on recent advances in cloud computing security
Pitropakis et al. It's All in the Cloud: Reviewing Cloud Security
Raj et al. Mapping of Security Issues and Concerns in Cloud Computing with Compromised Security Attributes
Manaa Data encryption scheme for large data scale in cloud computing
Alani et al. Security threats in cloud computing
Ahmed et al. Modeling Security Risk Factors in a Cloud Computing Environment.