Muthurajan et al., 2016 - Google Patents
DKSM‐DHT: privacy‐preserving dynamic key sharing model in distributed cloud computing environmentMuthurajan et al., 2016
View PDF- Document ID
- 2818698723722965608
- Author
- Muthurajan V
- Narayanasamy B
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Data outsourcing over the cloud considers the storage space minimization as an important factor for the last decade. Various existing systems such as a single key for virtual machine (VM), third‐party auditing (TPA) schemes are discussed for the less storage assurance. But …
- 238000000034 method 0 abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Michalas | The lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing | |
Pradeep et al. | An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment | |
Lu et al. | A Fine‐Grained IoT Data Access Control Scheme Combining Attribute‐Based Encryption and Blockchain | |
Jeong et al. | A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography | |
Sharma et al. | Blockchain-based distributed application for multimedia system using Hyperledger Fabric | |
Khan et al. | SSM: Secure-Split-Merge data distribution in cloud infrastructure | |
Chen et al. | Password-authenticated searchable encryption | |
Varghese et al. | EFFICIENT DATA STORAGE MODEL TO OVERCOME THE STORAGE PROBLEMS IN INDUSTRIES. | |
Kaur et al. | A blockchain‐based framework for privacy preservation of electronic health records (EHRs) | |
Wang et al. | On-chain and off-chain collaborative management system based on consortium blockchain | |
Riad et al. | Secure storage and retrieval of IoT data based on private information retrieval | |
Kwon et al. | A secure and efficient audit mechanism for dynamic shared data in cloud storage | |
Wei et al. | Dynamic data integrity auditing for secure outsourcing in the cloud | |
Vemulapalli et al. | Security frameworks in mobile cloud computing | |
Muthurajan et al. | An elliptic curve based schnorr cloud security model in distributed environment | |
Cui et al. | Lightweight key management on sensitive data in the cloud | |
Purushothama et al. | Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud | |
Malhotra et al. | Cloud Database Management System security challenges and solutions: an analysis | |
Premkamal et al. | Traceable CP-ABE for outsourced big data in cloud storage | |
Cui et al. | Efficient key management for IOT owner in the cloud | |
Raj et al. | Efficient mechanism for sharing private data in a secured manner | |
Kumar et al. | Secure query processing over encrypted database through cryptdb | |
Nagesh et al. | Modelling a secure framework for data verification and integrity in cloud environment | |
Muthurajan et al. | DKSM‐DHT: privacy‐preserving dynamic key sharing model in distributed cloud computing environment | |
Alsulami et al. | A survey on approaches of data confidentiality and integrity models in cloud computing systems |