[go: up one dir, main page]

Qaddour, 2018 - Google Patents

Multifactor Biometric Authentication for Cloud Computing

Qaddour, 2018

View PDF
Document ID
6818426014287326458
Author
Qaddour J
Publication year
Publication venue
The Seventeenth International Conference on Networks

External Links

Snippet

Cloud Computing is a fast-growing technology, which can do everything from running applications to storing data off-site. It means a person can save his work around the globe, retrieve, update, delete and use the data/information stored in the cloud from anywhere in …
Continue reading at personales.upv.es (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Similar Documents

Publication Publication Date Title
CN111488598B (en) Access control method, device, computer equipment and storage medium
US10277591B2 (en) Protection and verification of user authentication credentials against server compromise
CN111033502B (en) Authentication using biometric data and irreversible functions via blockchain
US8954758B2 (en) Password-less security and protection of online digital assets
US11048823B2 (en) Secure file sharing over multiple security domains and dispersed communication networks
US20230155818A1 (en) Systems and methods for non-deterministic multi-party, multi-user sender-receiver authentication and non-repudiatable resilient authorized access to secret data
Hemalatha et al. A comparative analysis of encryption techniques and data security issues in cloud computing
Sharma et al. Issues and challenges of data security in a cloud computing environment
US8867743B1 (en) Encryption of large amounts of data using secure encryption methods
US9864853B2 (en) Enhanced security mechanism for authentication of users of a system
Zareapoor et al. Establishing safe cloud: Ensuring data security and performance evaluation
Mukundrao et al. Enhancing security in cloud computing
Qaddour Multifactor Biometric Authentication for Cloud Computing
Prasadreddy et al. A threat free architecture for privacy assurance in cloud computing
Matloob A survey on cloud computing security issues and its possible solutions
Sharma et al. Survey paper on cloud storage security
Mudgal et al. ‘International journal of engineering sciences & research technology enhancing data security using encryption and splitting technique over multi-cloud environment
Prabhu et al. A STUDY on SECURITY ISSUES in SaaS CLOUD COMPUTING
US20250158807A1 (en) Computerized systems and methods for a multi-faceted encryption platform
Dinesha et al. Evaluation of secure cloud transmission protocol
Kumar et al. Key-Enforced Access Control and Performance Analysis of DES and RSA Cryptography in Cloud Computing
Sreelakshmi et al. A hybrid optimization-based key generation for secure AAC in cloud-enabled big data environment
Abbas et al. A Security Model for SaaS in Cloud Computing.
Dey et al. State of the Art in Some Cloud Security Through Data Tracking
Abarna et al. An Enhanced Secure Data Outsourcing using RBAAC Model in Cloud Computing