Neelakantan et al., 2024 - Google Patents
Advanced Threat Protection for File StorageNeelakantan et al., 2024
- Document ID
- 13106387064002603273
- Author
- Neelakantan P
- Malige G
- Publication year
- Publication venue
- 2024 International Conference on Emerging Techniques in Computational Intelligence (ICETCI)
External Links
Snippet
Cloud storage is widely used in various industries, but concerns about data security persist. Traditional techniques like cryptography and steganography have limitations and cannot provide sufficient security on their own. To address this issue, we propose a unique security …
- 238000003860 storage 0 title abstract description 23
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wen et al. | Security analysis of a color image encryption based on bit-level and chaotic map | |
Poduval et al. | Secure file storage on cloud using hybrid cryptography | |
Ajmal et al. | Cloud computing platform: Performance analysis of prominent cryptographic algorithms | |
Mehta et al. | DieRoll: A unique key generation and encryption technique | |
Pavani et al. | Data security and privacy issues in cloud environment | |
Parekh et al. | Multilayer symmetric and asymmetric technique for audiovisual cryptography | |
ZHANG | Cryptographic Techniques in Digital Media Security: Current Practices and Future Directions. | |
Bachiphale et al. | A comprehensive review of visual cryptography for enhancing high-security applications | |
Rawal | Proxy re-encryption architect for storing and sharing of cloud contents | |
Bangar et al. | Study and comparison of cryptographic methods for cloud security | |
Sharath et al. | Analysis of secure multimedia communication in cloud computing | |
Chinnam et al. | Artificial intelligence enhanced security problems in real-time scenario using blowfish algorithm | |
Neelakantan et al. | Advanced Threat Protection for File Storage | |
Amma NG et al. | A novel scrambled data hiding approach towards securing sensitive data | |
Rani et al. | Facilitating secure information transfer via cloud with hybrid cryptography | |
Ahuja et al. | Dual layer secured password manager using Blowfish and LSB | |
Lotlikar et al. | Image steganography and cryptography using three level password security | |
Harshini et al. | Enhanced security with crystography using AES and LSB | |
JP4698261B2 (en) | Cryptographic communication system and method, and program | |
Hambali et al. | Cloud Security Using Least Significant Bit Steganography and Data Encryption Standard Algorithm | |
Bindu Madavi et al. | Security and privacy issues in cloud and IoT technology and their countermeasures | |
Patil et al. | Significant study of data encryption and steganography | |
Das et al. | Towards a novel cross-media encryption-cum-obfuscation technique | |
Poongothai et al. | Retinal Encryption Using Snnipet Pixel XOR with Huffman Sequential Encoding for Privacy Augmentation | |
Aery | String Compression Technique with Modified AES Encryption |