[go: up one dir, main page]

Neelakantan et al., 2024 - Google Patents

Advanced Threat Protection for File Storage

Neelakantan et al., 2024

Document ID
13106387064002603273
Author
Neelakantan P
Malige G
Publication year
Publication venue
2024 International Conference on Emerging Techniques in Computational Intelligence (ICETCI)

External Links

Snippet

Cloud storage is widely used in various industries, but concerns about data security persist. Traditional techniques like cryptography and steganography have limitations and cannot provide sufficient security on their own. To address this issue, we propose a unique security …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Similar Documents

Publication Publication Date Title
Wen et al. Security analysis of a color image encryption based on bit-level and chaotic map
Poduval et al. Secure file storage on cloud using hybrid cryptography
Ajmal et al. Cloud computing platform: Performance analysis of prominent cryptographic algorithms
Mehta et al. DieRoll: A unique key generation and encryption technique
Pavani et al. Data security and privacy issues in cloud environment
Parekh et al. Multilayer symmetric and asymmetric technique for audiovisual cryptography
ZHANG Cryptographic Techniques in Digital Media Security: Current Practices and Future Directions.
Bachiphale et al. A comprehensive review of visual cryptography for enhancing high-security applications
Rawal Proxy re-encryption architect for storing and sharing of cloud contents
Bangar et al. Study and comparison of cryptographic methods for cloud security
Sharath et al. Analysis of secure multimedia communication in cloud computing
Chinnam et al. Artificial intelligence enhanced security problems in real-time scenario using blowfish algorithm
Neelakantan et al. Advanced Threat Protection for File Storage
Amma NG et al. A novel scrambled data hiding approach towards securing sensitive data
Rani et al. Facilitating secure information transfer via cloud with hybrid cryptography
Ahuja et al. Dual layer secured password manager using Blowfish and LSB
Lotlikar et al. Image steganography and cryptography using three level password security
Harshini et al. Enhanced security with crystography using AES and LSB
JP4698261B2 (en) Cryptographic communication system and method, and program
Hambali et al. Cloud Security Using Least Significant Bit Steganography and Data Encryption Standard Algorithm
Bindu Madavi et al. Security and privacy issues in cloud and IoT technology and their countermeasures
Patil et al. Significant study of data encryption and steganography
Das et al. Towards a novel cross-media encryption-cum-obfuscation technique
Poongothai et al. Retinal Encryption Using Snnipet Pixel XOR with Huffman Sequential Encoding for Privacy Augmentation
Aery String Compression Technique with Modified AES Encryption