Ramachandran et al., 2023 - Google Patents
Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment.Ramachandran et al., 2023
- Document ID
- 10569597743624940863
- Author
- Ramachandran A
- Ramadevi P
- Alkhayyat A
- Yousif Y
- Publication year
- Publication venue
- Intelligent Automation & Soft Computing
External Links
Snippet
Nowadays, numerous applications are associated with cloud and user data gets collected globally and stored in cloud units. In addition to shared data storage, cloud computing technique offers multiple advantages for the user through different distribution designs like …
- 238000000034 method 0 title abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN116112274B (en) | Blockchain, management group rights and integration of access in an enterprise environment | |
| Liu et al. | Design patterns for blockchain-based self-sovereign identity | |
| JP6877448B2 (en) | Methods and systems for guaranteeing computer software using distributed hash tables and blockchain | |
| US20200084045A1 (en) | Establishing provenance of digital assets using blockchain system | |
| CN110383760A (en) | User-controlled, decentralized, distributed and secure content distribution | |
| US20230069247A1 (en) | Data sharing solution | |
| CN116506144B (en) | Method for implementing BIM privacy protection using InterPlanetary File System blockchain integrated network | |
| Alhazmi et al. | Towards big data security framework by leveraging fragmentation and blockchain technology | |
| Yang et al. | An access control model based on blockchain master-sidechain collaboration | |
| Ramachandran et al. | Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment. | |
| WO2021198750A1 (en) | System and method to manage information and documents on a native blockchain network system including permissioned blockchain, storage, sharing, organisation, porting and various applications | |
| Hashemi et al. | Decentralized user-centric access control using pubsub over blockchain | |
| Neela et al. | An improved RSA technique with efficient data integrity verification for outsourcing database in cloud | |
| CN119989324A (en) | Distributed trusted virtual human identity authentication system and method based on blockchain | |
| Ch et al. | Block Chain Based Secure with Improvised Bloom Filter over a Decentralized Access Control Network on a Cloud Platform. | |
| Li et al. | BEIR: A blockchain-based encrypted image retrieval scheme | |
| Wang et al. | An improved identity-based public audit protocol for cloud storage | |
| Alkhliwi | An efficient dynamic access control and security sharing scheme using blockchain | |
| Lin et al. | Designing a secure and scalable data sharing mechanism using decentralized identifiers (DID) | |
| Hemanth Kumar et al. | Layers based optimal privacy preservation of the on-premise data supported by the dual authentication and lightweight on fly encryption in cloud ecosystem | |
| Palladino | Blockchains | |
| Manakhari et al. | Enhancing data security with decentralized cloud storage: an IPFS approach | |
| Mirzaei et al. | Simorgh, a fully decentralized blockchain-based secure communication system | |
| Arissabarno et al. | Secure & Traceable Companies File Management System Using Blockchain and IPFS | |
| Satish Babu et al. | The purview of blockchain appositeness in computing paradigms: A survey. |