[go: up one dir, main page]

Mini, 2014 - Google Patents

Analysis of cloud security

Mini, 2014

View PDF
Document ID
16149151937836552804
Author
Mini S
Publication year

External Links

Snippet

'Cloud'is one of the most popular buzzwords rampant in today's technology dependent world. Data is the new currency of today's world. It does not matter whether it belongs to a user at home or a large corporation. Both need to be protected. Due to the ease of use and …
Continue reading at scholarworks.calstate.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network

Similar Documents

Publication Publication Date Title
Mohammed Cloud identity and access management–a model proposal
Zissis et al. Addressing cloud computing security issues
JP6625636B2 (en) Identity infrastructure as a service
Malik et al. Security framework for cloud computing environment: A review
Kumar World of cloud computing & security
Alnahari et al. Authentication of IoT device and IoT server using security key
KR20180002841A (en) Secure container platform for resource access and deployment in non-managed non-secure devices
Lonea et al. Identity management for cloud computing
Casey et al. An interoperable architecture for usable password-less authentication
Lata et al. A framework for security of public cloud environment
Krishnan Security and Privacy in Cloud Computing
Weingärtner et al. A design towards personally identifiable information control and awareness in OpenID Connect identity providers
Bajaj et al. Cloud security: the future of data storage
Gupta et al. Cloud computing: Security threats & control strategy using tri-mechanism
Bhosale et al. Enhancing data security in cloud computing using 3d framework & digital signature with encryption
Rai et al. Study of security risk and vulnerabilities of cloud computing
Singh Security in amazon web services
Reece Multi-cloud identity security utilizing Self-Sovereign Identity
Mini Analysis of cloud security
Pawar et al. Implementation of secure authentication scheme and access control in cloud computing
Kuzminykh et al. Mechanisms of ensuring security in Keystone service
Dahal Security architecture for cloud computing platform
Sachdeva Cloud computing: security risk analysis and recommendations
Walia Security Vulnerability in Mobile Cloud Computing (MCC).
US20250322396A1 (en) Encrypted subnets and secure containers