[go: up one dir, main page]

Singamaneni et al., 2022 - Google Patents

[Retracted] An Enhanced Dynamic Nonlinear Polynomial Integrity‐Based QHCP‐ABE Framework for Big Data Privacy and Security

Singamaneni et al., 2022

View PDF @Full View
Document ID
6987866060752666751
Author
Singamaneni K
Juneja A
Abd-Elnaby M
Gulati K
Kotecha K
Kumar A
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Topics such as computational sources and cloud‐based transmission and security of big data have turned out to be a major new domain of exploration due to the exponential evolution of cloud‐based data and grid facilities. Various categories of cloud services have …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations

Similar Documents

Publication Publication Date Title
JP6515246B2 (en) Determination of common secrets for the secure exchange of information and hierarchical and deterministic encryption keys
Nagaraju et al. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway
Karam Investigating the importance of ethics and security on internet of medical things (iomt)
US9698974B2 (en) Method for creating asymmetrical cryptographic key pairs
Gajmal et al. Blockchain-based access control and data sharing mechanism in cloud decentralized storage system
Chidambaram et al. Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
Singamaneni et al. An improved dynamic polynomial integrity based QCP-ABE framework on large cloud data security
Vrana Cyber security and data ownership
Bao et al. Secure multiparty computation protocol based on homomorphic encryption and its application in blockchain
Singamaneni et al. [Retracted] An Enhanced Dynamic Nonlinear Polynomial Integrity‐Based QHCP‐ABE Framework for Big Data Privacy and Security
Thompson et al. Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies
Jain et al. Quantum resistant blockchain-based architecture for secure medical data sharing
Wu et al. A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof
Li A Blockchain‐Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage
Agarwal et al. Guarded dual authentication based DRM with resurgence dynamic encryption techniques
Prakasha et al. Automated user authentication in wireless public key infrastructure for mobile devices using Aadhar card
Nie et al. Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT
WO2024026428A1 (en) Digital identity allocation, assignment, and management
Elumalai et al. Secure and efficient data storage with Rivest Shamir Adleman algorithm in cloud environment
JP5841955B2 (en) Functional cryptographic system and method
Antwi‐Boasiako et al. Enhanced multi‐key privacy‐preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis
Sakthivel et al. Advanced set containment deep learned Rabin certificateless signcryption for secured transmission with big data in cloud
Ali et al. Secure and efficient lattice-based signcryption for blockchain-enabled IoT healthcare
Kumar et al. Multi-level authentication for security in cloud using improved quantum key distribution
Prajapat et al. Blockchain-Enabled Secure Signature Scheme with Quantum Key Distribution for IoMT-Based Healthcare Systems