[go: up one dir, main page]

Gupta et al., 2023 - Google Patents

Data security in cloud computation

Gupta et al., 2023

Document ID
4041203407548758292
Author
Gupta Y
Narayan N
Publication year
Publication venue
2023 13th International Conference on Cloud Computing, Data Science & Engineering (Confluence)

External Links

Snippet

Cloud data protection is the process of safeguarding information stored, sent, or processed by a corporation in a cloud environment, regardless of whether the data is under the firm's direct control or in the custody of a third party. More and more businesses are moving away …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Manogaran et al. MetaCloudDataStorage architecture for big data security in cloud computing
Ghani et al. Issues and challenges in cloud storage architecture: a survey
US8910278B2 (en) Managing services in a cloud computing environment
Agarwal et al. The security risks associated with cloud computing
US11188667B2 (en) Monitoring and preventing unauthorized data access
JP2015524585A (en) Social sharing of security information within the group
US20180278634A1 (en) Cyber Security Event Detection
US11907367B2 (en) Dormant account identifier
Gupta et al. Data security in cloud computation
Bhoyar et al. Cloud computing: Service models, types, database and issues
Ali et al. Systematic analysis of on-premise and cloud services
Mehra et al. Analyzing cloud computing security issues and challenges
Nwobodo Cloud computing: Models, services, utility, advantages, security issues, and prototype
Goyal Security Concerns In the World of Cloud Computing.
Misra Cloud Computing: Fundamentals, Services and Security
US20210232703A1 (en) Systems and methods for domain-based smart contract execution governance in a dlt network
Chan et al. Cyber concerns with cloud computing
Al-Lawati et al. The impact of cloud computing IT departments: A case study of Oman's financial institutions
Asadullah et al. A survey on security issues and challenges in cloud computing
Ghani et al. Cloud storage architecture: research challenges and opportunities
Al-Thobhani et al. Cloud computing Security Solutions and Privacy.
Mohan et al. Research in cloud computing-an overview
Rosy et al. Challenges, service models and deployment models of cloud computing
Dhawan Conceptualization of cloud computing and its security threats, challenges, technologies and application
Settia et al. Unleashing the potential: Compliance standards using cloud computing