Mini, 2014 - Google Patents
Analysis of cloud securityMini, 2014
View PDF- Document ID
- 16149151937836552804
- Author
- Mini S
- Publication year
External Links
Snippet
'Cloud'is one of the most popular buzzwords rampant in today's technology dependent world. Data is the new currency of today's world. It does not matter whether it belongs to a user at home or a large corporation. Both need to be protected. Due to the ease of use and …
- 238000004458 analytical method 0 title description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mohammed | Cloud identity and access management–a model proposal | |
| Zissis et al. | Addressing cloud computing security issues | |
| JP6625636B2 (en) | Identity infrastructure as a service | |
| Malik et al. | Security framework for cloud computing environment: A review | |
| Kumar | World of cloud computing & security | |
| Alnahari et al. | Authentication of IoT device and IoT server using security key | |
| KR20180002841A (en) | Secure container platform for resource access and deployment in non-managed non-secure devices | |
| Lonea et al. | Identity management for cloud computing | |
| Casey et al. | An interoperable architecture for usable password-less authentication | |
| Lata et al. | A framework for security of public cloud environment | |
| Krishnan | Security and Privacy in Cloud Computing | |
| Weingärtner et al. | A design towards personally identifiable information control and awareness in OpenID Connect identity providers | |
| Bajaj et al. | Cloud security: the future of data storage | |
| Gupta et al. | Cloud computing: Security threats & control strategy using tri-mechanism | |
| Bhosale et al. | Enhancing data security in cloud computing using 3d framework & digital signature with encryption | |
| Rai et al. | Study of security risk and vulnerabilities of cloud computing | |
| Singh | Security in amazon web services | |
| Reece | Multi-cloud identity security utilizing Self-Sovereign Identity | |
| Mini | Analysis of cloud security | |
| Pawar et al. | Implementation of secure authentication scheme and access control in cloud computing | |
| Kuzminykh et al. | Mechanisms of ensuring security in Keystone service | |
| Dahal | Security architecture for cloud computing platform | |
| Sachdeva | Cloud computing: security risk analysis and recommendations | |
| Walia | Security Vulnerability in Mobile Cloud Computing (MCC). | |
| US20250322396A1 (en) | Encrypted subnets and secure containers |