Mahalakshmi, 2017 - Google Patents
Assessment on security issues and classification in cloud computingMahalakshmi, 2017
View PDF- Document ID
- 10222853022093615853
- Author
- Mahalakshmi B
- Publication year
- Publication venue
- Assessment
External Links
Snippet
In the cloud environment, security and privacy becomes a major concern to be addressed and it should be reliable and truthful. Likewise cloud computing is one among them where the data is outsourced to some third party cloud providers for providing service to the user in …
- 239000008186 active pharmaceutical agent 0 description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Islam et al. | A classification and characterization of security threats in cloud computing | |
Barona et al. | A survey on data breach challenges in cloud computing security: Issues and threats | |
Jouini et al. | A security framework for secure cloud computing environments | |
Alhenaki et al. | A survey on the security of cloud computing | |
Modi et al. | A survey on security issues and solutions at different layers of Cloud computing | |
An et al. | Reviews on security issues and challenges in cloud computing | |
Popoola et al. | Ransomware: Current trend, challenges, and research directions | |
Mishra et al. | Security threats and recent countermeasures in cloud computing | |
Gupta et al. | Taxonomy of cloud security | |
Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
Bokhari et al. | Security and privacy issues in cloud computing | |
Jouini et al. | Surveying and analyzing security problems in cloud computing environments | |
Chimakurthi | Cloud Security-A Semantic Approach in End to End Security Compliance | |
Shajan et al. | Survey of security threats and countermeasures in cloud computing | |
Kumar et al. | A survey on cloud computing security threats and vulnerabilities | |
Morovati et al. | A network based document management model to prevent data extrusion | |
Hashemi et al. | Taxonomy of the security aspects of cloud computing systems-a survey | |
Patil Madhubala | Survey on security concerns in Cloud computing | |
Kofahi et al. | Identifying the top threats in cloud computing and its suggested solutions: a survey | |
Malomo et al. | A survey on recent advances in cloud computing security | |
Pitropakis et al. | It's All in the Cloud: Reviewing Cloud Security | |
Raj et al. | Mapping of Security Issues and Concerns in Cloud Computing with Compromised Security Attributes | |
Manaa | Data encryption scheme for large data scale in cloud computing | |
Alani et al. | Security threats in cloud computing | |
Ahmed et al. | Modeling Security Risk Factors in a Cloud Computing Environment. |