Shivanna et al., 2017 - Google Patents
Privacy preservation in cloud computing with double encryption methodShivanna et al., 2017
View PDF- Document ID
- 630406611086460231
- Author
- Shivanna K
- Deva S
- Santoshkumar M
- Publication year
- Publication venue
- Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016
External Links
Snippet
Cloud computing is advanced technology, which provides a road map to access the applications over the internet. It is a platform, where cloud consumer and data owner customize their applications through online. Due to storing vast amount of data on cloud …
- 238000004321 preservation 0 title abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3962019B1 (en) | Trusted data transmission methods, apparatuses, and devices | |
JP2012518330A (en) | Reliable cloud computing and cloud service framework | |
Yan et al. | Integrity audit of shared cloud data with identity tracking | |
Kousalya et al. | Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique | |
Dave et al. | Cloud security issues and challenges | |
Jakóbik | Big data security | |
Guo et al. | Using blockchain to control access to cloud data | |
Sharma et al. | MapSafe: A complete tool for achieving geospatial data sovereignty | |
Shivanna et al. | Privacy preservation in cloud computing with double encryption method | |
Garcia et al. | A Survey of Blockchain-Based Privacy Applications: An Analysis of Consent Management and Self-Sovereign Identity Approaches | |
Grothe et al. | Your cloud in my company: Modern rights management services revisited | |
Suresha et al. | Enhancing data security in cloud computing using threshold cryptography technique | |
Behera et al. | Big data security threats and prevention measures in cloud and Hadoop | |
Henry et al. | Cloud Computing Security Threats And Solutions | |
Dwivedi et al. | On accountable and distributed audit of outsourced data | |
Odugu et al. | A fine-grained access control survey for the secure big data access | |
Srinivas et al. | Trusted execution environment for data protection in cloud | |
Leila et al. | A new framework of authentication over cloud computing | |
Li | Context-aware attribute-based techniques for data security and access control in mobile cloud environment | |
Vanjipriya et al. | Blockchain-Based Access Control with Decentralized Architecture for Data Storage and Transfer | |
Manimuthu et al. | RETRACTED ARTICLE: An enhanced approach on distributed accountability for shared data in cloud | |
Raja et al. | An enhanced study on cloud data services using security technologies | |
Gupta et al. | Data Security Threats Arising Between a Cloud and Its Users | |
Ashok Reddy et al. | Identity-Based Remote Data Integrity Checking Using Lattice Approach by Third-Party Auditor | |
Saraswat | Data security techniques in cloud computing |