[go: up one dir, main page]

Srisakthi et al., 2015 - Google Patents

Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment

Srisakthi et al., 2015

Document ID
6633474398067309012
Author
Srisakthi S
Shanthi A
Publication year
Publication venue
Information Security Journal: A Global Perspective

External Links

Snippet

This paper addresses the problem of data security and fault tolerance in the Cloud. The application of the proposed model includes organizations, business groups, and establishments where the data are highly confidential and need to be kept in a very secure …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
JP6865850B2 (en) Obtaining access data to the blockchain network using a highly available and reliable execution environment
CA3058236C (en) Retrieving public data for blockchain networks using highly available trusted execution environments
Cheng et al. Secure big data storage and sharing scheme for cloud tenants
JP6120895B2 (en) System and method for securing data in the cloud
JP5650348B2 (en) System and method for securing data in motion
JP5663083B2 (en) System and method for securing data in motion
JP2012518330A (en) Reliable cloud computing and cloud service framework
HK1217834A1 (en) Systems and methods for secure data sharing
Yan et al. Integrity audit of shared cloud data with identity tracking
Srisakthi et al. Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment
Kang et al. Attack on Privacy‐Preserving Public Auditing Schemes for Cloud Storage
CN113656829A (en) Medical data security sharing method based on lattice code and alliance chain
Murthy Cryptographic secure cloud storage model with anonymous authentication and automatic file recovery
Srisakthi et al. Pcsp: A protected cloud storage provider employing light weight techniques
Ganorkar et al. An information security scheme for cloud based environment using 3DES encryption algorithm
Yasmin et al. Decentralized Entrance Power with Secret Endorsement of Data Stored in Clouds
Bingu et al. Cloud auditing and authentication scheme for establishing privacy preservation
Chandran et al. Data management issues in cloud integrated computing: A big picture
Chouhan et al. Reliable verification of distributed encoded data fragments in the cloud
Raja et al. An enhanced study on cloud data services using security technologies
Andersen Decentralized authorization with private delegation
Gagged et al. Improved secure dynamic bit standard technique for a private cloud platform to address security challenges
Mothlabeng et al. An Algorithm to Enhance Data Integrity in Cloud Computing
George et al. Safest Secure and Consistent Data Services in the Storage of Cloud Computing
Yang et al. PADP: A parallel data possession audit model for cloud storage