Mudgal et al., 2018 - Google Patents
'International journal of engineering sciences & research technology enhancing data security using encryption and splitting technique over multi-cloud environmentMudgal et al., 2018
View PDF- Document ID
- 1346189681732558771
- Author
- Mudgal R
- Bhatia M
- Publication year
- Publication venue
- Eng. Sci. Res. Technol
External Links
Snippet
Now days cloud computing become one of the main topic of IT and main point is cloud data storage security. Cloud computing is the fastest growing technology. This technology provides access to many different applications. Cloud computing is used as data storage so …
- 238000000034 method 0 title abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11604901B2 (en) | Systems and methods for using extended hardware security modules | |
| CN110892691B (en) | Secure execution platform cluster | |
| Ghani et al. | Issues and challenges in cloud storage architecture: a survey | |
| US9209972B2 (en) | Mediator device monitoring and controlling access to electronic content | |
| US9894040B2 (en) | Trust services for securing data in the cloud | |
| Sauber et al. | A new secure model for data protection over cloud computing | |
| Khan et al. | SSM: Secure-Split-Merge data distribution in cloud infrastructure | |
| CN117879819A (en) | Key management method, device, storage medium, equipment and computing power service system | |
| US9219715B2 (en) | Mediator utilizing electronic content to enforce policies to a resource | |
| Gera et al. | RECS methodology for secured data storage and retrieval in cloud | |
| Albaroodi et al. | A proposed framework for outsourcing and secure encrypted data on OpenStack object storage (Swift) | |
| Olanrewaju et al. | RFDA: Reliable framework for data administration based on split-merge policy | |
| Mudgal et al. | ‘International journal of engineering sciences & research technology enhancing data security using encryption and splitting technique over multi-cloud environment | |
| US9092780B2 (en) | User-mediator monitoring and controlling access to electronic content | |
| Siopi et al. | DeCStor: A Framework for Privately and Securely Sharing Files Using a Public Blockchain | |
| Sathya | A quick review of data security and privacy in cloud computing | |
| Almuseelem | Enhance the Security of Data Based on Server-Side Encryption in a Cloud Environment. | |
| HASSAN BIJIK | A review on securing distributed Big Data Storage in Cloud Environment | |
| Waizenegger | Data security in multi-tenant environments in the cloud | |
| Siopi et al. | DeCStor: A Framework for Privately and Securely Sharing Files Using a Public | |
| Parziale et al. | Maximizing security with LinuxONE | |
| Theebendra et al. | Cloud Computing Security-Data Storage and Transmission | |
| Popli et al. | A Critical Analysis on Cloud Security | |
| Yadav et al. | The recent trends, techniques and methods of cloud security | |
| Aissaoui et al. | Data Security and Access Management in Cloud Computing: Capability list-based Cyrptography |