[go: up one dir, main page]

Shivanna et al., 2017 - Google Patents

Privacy preservation in cloud computing with double encryption method

Shivanna et al., 2017

View PDF
Document ID
630406611086460231
Author
Shivanna K
Deva S
Santoshkumar M
Publication year
Publication venue
Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016

External Links

Snippet

Cloud computing is advanced technology, which provides a road map to access the applications over the internet. It is a platform, where cloud consumer and data owner customize their applications through online. Due to storing vast amount of data on cloud …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Similar Documents

Publication Publication Date Title
EP3962019B1 (en) Trusted data transmission methods, apparatuses, and devices
JP2012518330A (en) Reliable cloud computing and cloud service framework
Yan et al. Integrity audit of shared cloud data with identity tracking
Kousalya et al. Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique
Dave et al. Cloud security issues and challenges
Jakóbik Big data security
Guo et al. Using blockchain to control access to cloud data
Sharma et al. MapSafe: A complete tool for achieving geospatial data sovereignty
Shivanna et al. Privacy preservation in cloud computing with double encryption method
Garcia et al. A Survey of Blockchain-Based Privacy Applications: An Analysis of Consent Management and Self-Sovereign Identity Approaches
Grothe et al. Your cloud in my company: Modern rights management services revisited
Suresha et al. Enhancing data security in cloud computing using threshold cryptography technique
Behera et al. Big data security threats and prevention measures in cloud and Hadoop
Henry et al. Cloud Computing Security Threats And Solutions
Dwivedi et al. On accountable and distributed audit of outsourced data
Odugu et al. A fine-grained access control survey for the secure big data access
Srinivas et al. Trusted execution environment for data protection in cloud
Leila et al. A new framework of authentication over cloud computing
Li Context-aware attribute-based techniques for data security and access control in mobile cloud environment
Vanjipriya et al. Blockchain-Based Access Control with Decentralized Architecture for Data Storage and Transfer
Manimuthu et al. RETRACTED ARTICLE: An enhanced approach on distributed accountability for shared data in cloud
Raja et al. An enhanced study on cloud data services using security technologies
Gupta et al. Data Security Threats Arising Between a Cloud and Its Users
Ashok Reddy et al. Identity-Based Remote Data Integrity Checking Using Lattice Approach by Third-Party Auditor
Saraswat Data security techniques in cloud computing