Qaddour, 2018 - Google Patents
Multifactor Biometric Authentication for Cloud ComputingQaddour, 2018
View PDF- Document ID
- 6818426014287326458
- Author
- Qaddour J
- Publication year
- Publication venue
- The Seventeenth International Conference on Networks
External Links
Snippet
Cloud Computing is a fast-growing technology, which can do everything from running applications to storing data off-site. It means a person can save his work around the globe, retrieve, update, delete and use the data/information stored in the cloud from anywhere in …
- 238000000034 method 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111488598B (en) | Access control method, device, computer equipment and storage medium | |
| US10277591B2 (en) | Protection and verification of user authentication credentials against server compromise | |
| CN111033502B (en) | Authentication using biometric data and irreversible functions via blockchain | |
| US8954758B2 (en) | Password-less security and protection of online digital assets | |
| US11048823B2 (en) | Secure file sharing over multiple security domains and dispersed communication networks | |
| US20230155818A1 (en) | Systems and methods for non-deterministic multi-party, multi-user sender-receiver authentication and non-repudiatable resilient authorized access to secret data | |
| Hemalatha et al. | A comparative analysis of encryption techniques and data security issues in cloud computing | |
| Sharma et al. | Issues and challenges of data security in a cloud computing environment | |
| US8867743B1 (en) | Encryption of large amounts of data using secure encryption methods | |
| US9864853B2 (en) | Enhanced security mechanism for authentication of users of a system | |
| Zareapoor et al. | Establishing safe cloud: Ensuring data security and performance evaluation | |
| Mukundrao et al. | Enhancing security in cloud computing | |
| Qaddour | Multifactor Biometric Authentication for Cloud Computing | |
| Prasadreddy et al. | A threat free architecture for privacy assurance in cloud computing | |
| Matloob | A survey on cloud computing security issues and its possible solutions | |
| Sharma et al. | Survey paper on cloud storage security | |
| Mudgal et al. | ‘International journal of engineering sciences & research technology enhancing data security using encryption and splitting technique over multi-cloud environment | |
| Prabhu et al. | A STUDY on SECURITY ISSUES in SaaS CLOUD COMPUTING | |
| US20250158807A1 (en) | Computerized systems and methods for a multi-faceted encryption platform | |
| Dinesha et al. | Evaluation of secure cloud transmission protocol | |
| Kumar et al. | Key-Enforced Access Control and Performance Analysis of DES and RSA Cryptography in Cloud Computing | |
| Sreelakshmi et al. | A hybrid optimization-based key generation for secure AAC in cloud-enabled big data environment | |
| Abbas et al. | A Security Model for SaaS in Cloud Computing. | |
| Dey et al. | State of the Art in Some Cloud Security Through Data Tracking | |
| Abarna et al. | An Enhanced Secure Data Outsourcing using RBAAC Model in Cloud Computing |