Gupta et al., 2023 - Google Patents
Data security in cloud computationGupta et al., 2023
- Document ID
- 4041203407548758292
- Author
- Gupta Y
- Narayan N
- Publication year
- Publication venue
- 2023 13th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
External Links
Snippet
Cloud data protection is the process of safeguarding information stored, sent, or processed by a corporation in a cloud environment, regardless of whether the data is under the firm's direct control or in the custody of a third party. More and more businesses are moving away …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Manogaran et al. | MetaCloudDataStorage architecture for big data security in cloud computing | |
| Ghani et al. | Issues and challenges in cloud storage architecture: a survey | |
| US8910278B2 (en) | Managing services in a cloud computing environment | |
| Agarwal et al. | The security risks associated with cloud computing | |
| US11188667B2 (en) | Monitoring and preventing unauthorized data access | |
| JP2015524585A (en) | Social sharing of security information within the group | |
| US20180278634A1 (en) | Cyber Security Event Detection | |
| US11907367B2 (en) | Dormant account identifier | |
| Gupta et al. | Data security in cloud computation | |
| Bhoyar et al. | Cloud computing: Service models, types, database and issues | |
| Ali et al. | Systematic analysis of on-premise and cloud services | |
| Mehra et al. | Analyzing cloud computing security issues and challenges | |
| Nwobodo | Cloud computing: Models, services, utility, advantages, security issues, and prototype | |
| Goyal | Security Concerns In the World of Cloud Computing. | |
| Misra | Cloud Computing: Fundamentals, Services and Security | |
| US20210232703A1 (en) | Systems and methods for domain-based smart contract execution governance in a dlt network | |
| Chan et al. | Cyber concerns with cloud computing | |
| Al-Lawati et al. | The impact of cloud computing IT departments: A case study of Oman's financial institutions | |
| Asadullah et al. | A survey on security issues and challenges in cloud computing | |
| Ghani et al. | Cloud storage architecture: research challenges and opportunities | |
| Al-Thobhani et al. | Cloud computing Security Solutions and Privacy. | |
| Mohan et al. | Research in cloud computing-an overview | |
| Rosy et al. | Challenges, service models and deployment models of cloud computing | |
| Dhawan | Conceptualization of cloud computing and its security threats, challenges, technologies and application | |
| Settia et al. | Unleashing the potential: Compliance standards using cloud computing |