[go: up one dir, main page]

Khan et al., 2015 - Google Patents

SSM: Secure-Split-Merge data distribution in cloud infrastructure

Khan et al., 2015

Document ID
3613531820671068890
Author
Khan B
Baba A
Olanrewaju R
Lone S
Zulkurnain N
Publication year
Publication venue
2015 IEEE Conference on Open Systems (ICOS)

External Links

Snippet

With the advancement of cloud storage services the vulnerabilities associated with cloud- related data has increased. It affects the cloud distributed data servers that are not only used for data storage, but also used for managing a huge amount of data with distributed file …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Similar Documents

Publication Publication Date Title
Dubey et al. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment
CN102318262B (en) Trusted cloud computing and services framework
Arora et al. Cloud security ecosystem for data security and privacy
Alenizi et al. Security and privacy issues in cloud computing
CN102318263A (en) Trusted cloud computing and services framework
Garg et al. Comparative analysis of cloud data integrity auditing protocols
Khan et al. SSM: Secure-Split-Merge data distribution in cloud infrastructure
Gajmal et al. Blockchain-based access control and data sharing mechanism in cloud decentralized storage system
US20220014367A1 (en) Decentralized computing systems and methods for performing actions using stored private data
Junghanns et al. Engineering of secure multi-cloud storage
Hemalatha et al. A comparative analysis of encryption techniques and data security issues in cloud computing
Aloraini et al. A survey on data confidentiality and privacy in cloud computing
Manjyanaik et al. Preserving Confidential Data Using Improved Rivest-Shamir Adleman to Secure Multi-Cloud.
Agarkhed et al. An efficient auditing scheme for data storage security in cloud
Adlam et al. Applying blockchain technology to security-related aspects of electronic healthcare record infrastructure
Olanrewaju et al. RFDA: Reliable framework for data administration based on split-merge policy
Albaroodi et al. A proposed framework for outsourcing and secure encrypted data on OpenStack object storage (Swift)
Reddy et al. A modified cryptographic approach for securing distributed data storage in cloud computing
Hammami et al. Security issues in cloud computing and associated alleviation approaches
Yasmin et al. Decentralized Entrance Power with Secret Endorsement of Data Stored in Clouds
Pokharkar et al. Securing data in decentralized cloud storage for authorized encrypted search with privacy-preserving on healthcare databases
Mudgal et al. ‘International journal of engineering sciences & research technology enhancing data security using encryption and splitting technique over multi-cloud environment
Asesh Encryption technique for a trusted cloud computing environment
Bindlish et al. Study of RSA, DES and Cloud Computing.
Raja et al. An enhanced study on cloud data services using security technologies