Khan et al., 2015 - Google Patents
SSM: Secure-Split-Merge data distribution in cloud infrastructureKhan et al., 2015
- Document ID
- 3613531820671068890
- Author
- Khan B
- Baba A
- Olanrewaju R
- Lone S
- Zulkurnain N
- Publication year
- Publication venue
- 2015 IEEE Conference on Open Systems (ICOS)
External Links
Snippet
With the advancement of cloud storage services the vulnerabilities associated with cloud- related data has increased. It affects the cloud distributed data servers that are not only used for data storage, but also used for managing a huge amount of data with distributed file …
- 238000000034 method 0 abstract description 37
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Dubey et al. | Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment | |
| CN102318262B (en) | Trusted cloud computing and services framework | |
| Arora et al. | Cloud security ecosystem for data security and privacy | |
| Alenizi et al. | Security and privacy issues in cloud computing | |
| CN102318263A (en) | Trusted cloud computing and services framework | |
| Garg et al. | Comparative analysis of cloud data integrity auditing protocols | |
| Khan et al. | SSM: Secure-Split-Merge data distribution in cloud infrastructure | |
| Gajmal et al. | Blockchain-based access control and data sharing mechanism in cloud decentralized storage system | |
| US20220014367A1 (en) | Decentralized computing systems and methods for performing actions using stored private data | |
| Junghanns et al. | Engineering of secure multi-cloud storage | |
| Hemalatha et al. | A comparative analysis of encryption techniques and data security issues in cloud computing | |
| Aloraini et al. | A survey on data confidentiality and privacy in cloud computing | |
| Manjyanaik et al. | Preserving Confidential Data Using Improved Rivest-Shamir Adleman to Secure Multi-Cloud. | |
| Agarkhed et al. | An efficient auditing scheme for data storage security in cloud | |
| Adlam et al. | Applying blockchain technology to security-related aspects of electronic healthcare record infrastructure | |
| Olanrewaju et al. | RFDA: Reliable framework for data administration based on split-merge policy | |
| Albaroodi et al. | A proposed framework for outsourcing and secure encrypted data on OpenStack object storage (Swift) | |
| Reddy et al. | A modified cryptographic approach for securing distributed data storage in cloud computing | |
| Hammami et al. | Security issues in cloud computing and associated alleviation approaches | |
| Yasmin et al. | Decentralized Entrance Power with Secret Endorsement of Data Stored in Clouds | |
| Pokharkar et al. | Securing data in decentralized cloud storage for authorized encrypted search with privacy-preserving on healthcare databases | |
| Mudgal et al. | ‘International journal of engineering sciences & research technology enhancing data security using encryption and splitting technique over multi-cloud environment | |
| Asesh | Encryption technique for a trusted cloud computing environment | |
| Bindlish et al. | Study of RSA, DES and Cloud Computing. | |
| Raja et al. | An enhanced study on cloud data services using security technologies |