[go: up one dir, main page]

Muthurajan et al., 2016 - Google Patents

DKSM‐DHT: privacy‐preserving dynamic key sharing model in distributed cloud computing environment

Muthurajan et al., 2016

View PDF
Document ID
2818698723722965608
Author
Muthurajan V
Narayanasamy B
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Data outsourcing over the cloud considers the storage space minimization as an important factor for the last decade. Various existing systems such as a single key for virtual machine (VM), third‐party auditing (TPA) schemes are discussed for the less storage assurance. But …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
Michalas The lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing
Pradeep et al. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
Lu et al. A Fine‐Grained IoT Data Access Control Scheme Combining Attribute‐Based Encryption and Blockchain
Jeong et al. A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography
Sharma et al. Blockchain-based distributed application for multimedia system using Hyperledger Fabric
Khan et al. SSM: Secure-Split-Merge data distribution in cloud infrastructure
Chen et al. Password-authenticated searchable encryption
Varghese et al. EFFICIENT DATA STORAGE MODEL TO OVERCOME THE STORAGE PROBLEMS IN INDUSTRIES.
Kaur et al. A blockchain‐based framework for privacy preservation of electronic health records (EHRs)
Wang et al. On-chain and off-chain collaborative management system based on consortium blockchain
Riad et al. Secure storage and retrieval of IoT data based on private information retrieval
Kwon et al. A secure and efficient audit mechanism for dynamic shared data in cloud storage
Wei et al. Dynamic data integrity auditing for secure outsourcing in the cloud
Vemulapalli et al. Security frameworks in mobile cloud computing
Muthurajan et al. An elliptic curve based schnorr cloud security model in distributed environment
Cui et al. Lightweight key management on sensitive data in the cloud
Purushothama et al. Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
Malhotra et al. Cloud Database Management System security challenges and solutions: an analysis
Premkamal et al. Traceable CP-ABE for outsourced big data in cloud storage
Cui et al. Efficient key management for IOT owner in the cloud
Raj et al. Efficient mechanism for sharing private data in a secured manner
Kumar et al. Secure query processing over encrypted database through cryptdb
Nagesh et al. Modelling a secure framework for data verification and integrity in cloud environment
Muthurajan et al. DKSM‐DHT: privacy‐preserving dynamic key sharing model in distributed cloud computing environment
Alsulami et al. A survey on approaches of data confidentiality and integrity models in cloud computing systems