Singamaneni et al., 2022 - Google Patents
[Retracted] An Enhanced Dynamic Nonlinear Polynomial Integrity‐Based QHCP‐ABE Framework for Big Data Privacy and SecuritySingamaneni et al., 2022
View PDF- Document ID
- 6987866060752666751
- Author
- Singamaneni K
- Juneja A
- Abd-Elnaby M
- Gulati K
- Kotecha K
- Kumar A
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Topics such as computational sources and cloud‐based transmission and security of big data have turned out to be a major new domain of exploration due to the exponential evolution of cloud‐based data and grid facilities. Various categories of cloud services have …
- 238000000034 method 0 abstract description 51
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6515246B2 (en) | Determination of common secrets for the secure exchange of information and hierarchical and deterministic encryption keys | |
| Nagaraju et al. | Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway | |
| Karam | Investigating the importance of ethics and security on internet of medical things (iomt) | |
| US9698974B2 (en) | Method for creating asymmetrical cryptographic key pairs | |
| Gajmal et al. | Blockchain-based access control and data sharing mechanism in cloud decentralized storage system | |
| Chidambaram et al. | Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique | |
| Singamaneni et al. | An improved dynamic polynomial integrity based QCP-ABE framework on large cloud data security | |
| Vrana | Cyber security and data ownership | |
| Bao et al. | Secure multiparty computation protocol based on homomorphic encryption and its application in blockchain | |
| Singamaneni et al. | [Retracted] An Enhanced Dynamic Nonlinear Polynomial Integrity‐Based QHCP‐ABE Framework for Big Data Privacy and Security | |
| Thompson et al. | Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies | |
| Jain et al. | Quantum resistant blockchain-based architecture for secure medical data sharing | |
| Wu et al. | A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof | |
| Li | A Blockchain‐Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage | |
| Agarwal et al. | Guarded dual authentication based DRM with resurgence dynamic encryption techniques | |
| Prakasha et al. | Automated user authentication in wireless public key infrastructure for mobile devices using Aadhar card | |
| Nie et al. | Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT | |
| WO2024026428A1 (en) | Digital identity allocation, assignment, and management | |
| Elumalai et al. | Secure and efficient data storage with Rivest Shamir Adleman algorithm in cloud environment | |
| JP5841955B2 (en) | Functional cryptographic system and method | |
| Antwi‐Boasiako et al. | Enhanced multi‐key privacy‐preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis | |
| Sakthivel et al. | Advanced set containment deep learned Rabin certificateless signcryption for secured transmission with big data in cloud | |
| Ali et al. | Secure and efficient lattice-based signcryption for blockchain-enabled IoT healthcare | |
| Kumar et al. | Multi-level authentication for security in cloud using improved quantum key distribution | |
| Prajapat et al. | Blockchain-Enabled Secure Signature Scheme with Quantum Key Distribution for IoMT-Based Healthcare Systems |