Srisakthi et al., 2015 - Google Patents
Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environmentSrisakthi et al., 2015
- Document ID
- 6633474398067309012
- Author
- Srisakthi S
- Shanthi A
- Publication year
- Publication venue
- Information Security Journal: A Global Perspective
External Links
Snippet
This paper addresses the problem of data security and fault tolerance in the Cloud. The application of the proposed model includes organizations, business groups, and establishments where the data are highly confidential and need to be kept in a very secure …
- 230000002708 enhancing 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6865850B2 (en) | Obtaining access data to the blockchain network using a highly available and reliable execution environment | |
CA3058236C (en) | Retrieving public data for blockchain networks using highly available trusted execution environments | |
Cheng et al. | Secure big data storage and sharing scheme for cloud tenants | |
JP6120895B2 (en) | System and method for securing data in the cloud | |
JP5650348B2 (en) | System and method for securing data in motion | |
JP5663083B2 (en) | System and method for securing data in motion | |
JP2012518330A (en) | Reliable cloud computing and cloud service framework | |
HK1217834A1 (en) | Systems and methods for secure data sharing | |
Yan et al. | Integrity audit of shared cloud data with identity tracking | |
Srisakthi et al. | Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment | |
Kang et al. | Attack on Privacy‐Preserving Public Auditing Schemes for Cloud Storage | |
CN113656829A (en) | Medical data security sharing method based on lattice code and alliance chain | |
Murthy | Cryptographic secure cloud storage model with anonymous authentication and automatic file recovery | |
Srisakthi et al. | Pcsp: A protected cloud storage provider employing light weight techniques | |
Ganorkar et al. | An information security scheme for cloud based environment using 3DES encryption algorithm | |
Yasmin et al. | Decentralized Entrance Power with Secret Endorsement of Data Stored in Clouds | |
Bingu et al. | Cloud auditing and authentication scheme for establishing privacy preservation | |
Chandran et al. | Data management issues in cloud integrated computing: A big picture | |
Chouhan et al. | Reliable verification of distributed encoded data fragments in the cloud | |
Raja et al. | An enhanced study on cloud data services using security technologies | |
Andersen | Decentralized authorization with private delegation | |
Gagged et al. | Improved secure dynamic bit standard technique for a private cloud platform to address security challenges | |
Mothlabeng et al. | An Algorithm to Enhance Data Integrity in Cloud Computing | |
George et al. | Safest Secure and Consistent Data Services in the Storage of Cloud Computing | |
Yang et al. | PADP: A parallel data possession audit model for cloud storage |