[go: up one dir, main page]

Ramachandran et al., 2023 - Google Patents

Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment.

Ramachandran et al., 2023

Document ID
10569597743624940863
Author
Ramachandran A
Ramadevi P
Alkhayyat A
Yousif Y
Publication year
Publication venue
Intelligent Automation & Soft Computing

External Links

Snippet

Nowadays, numerous applications are associated with cloud and user data gets collected globally and stored in cloud units. In addition to shared data storage, cloud computing technique offers multiple advantages for the user through different distribution designs like …
Continue reading at search.ebscohost.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Similar Documents

Publication Publication Date Title
CN116112274B (en) Blockchain, management group rights and integration of access in an enterprise environment
Liu et al. Design patterns for blockchain-based self-sovereign identity
JP6877448B2 (en) Methods and systems for guaranteeing computer software using distributed hash tables and blockchain
US20200084045A1 (en) Establishing provenance of digital assets using blockchain system
CN110383760A (en) User-controlled, decentralized, distributed and secure content distribution
US20230069247A1 (en) Data sharing solution
CN116506144B (en) Method for implementing BIM privacy protection using InterPlanetary File System blockchain integrated network
Alhazmi et al. Towards big data security framework by leveraging fragmentation and blockchain technology
Yang et al. An access control model based on blockchain master-sidechain collaboration
Ramachandran et al. Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment.
WO2021198750A1 (en) System and method to manage information and documents on a native blockchain network system including permissioned blockchain, storage, sharing, organisation, porting and various applications
Hashemi et al. Decentralized user-centric access control using pubsub over blockchain
Neela et al. An improved RSA technique with efficient data integrity verification for outsourcing database in cloud
CN119989324A (en) Distributed trusted virtual human identity authentication system and method based on blockchain
Ch et al. Block Chain Based Secure with Improvised Bloom Filter over a Decentralized Access Control Network on a Cloud Platform.
Li et al. BEIR: A blockchain-based encrypted image retrieval scheme
Wang et al. An improved identity-based public audit protocol for cloud storage
Alkhliwi An efficient dynamic access control and security sharing scheme using blockchain
Lin et al. Designing a secure and scalable data sharing mechanism using decentralized identifiers (DID)
Hemanth Kumar et al. Layers based optimal privacy preservation of the on-premise data supported by the dual authentication and lightweight on fly encryption in cloud ecosystem
Palladino Blockchains
Manakhari et al. Enhancing data security with decentralized cloud storage: an IPFS approach
Mirzaei et al. Simorgh, a fully decentralized blockchain-based secure communication system
Arissabarno et al. Secure & Traceable Companies File Management System Using Blockchain and IPFS
Satish Babu et al. The purview of blockchain appositeness in computing paradigms: A survey.