Gupta et al., 2012 - Google Patents
A secure and lightweight approach for critical data security in cloudGupta et al., 2012
View PDF- Document ID
- 7499148990575828409
- Author
- Gupta S
- Kumar P
- Sardana A
- Abraham A
- Publication year
- Publication venue
- 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)
External Links
Snippet
Cloud computing is a model that provides ubiquitous, on demand access to a shared pool of computing resources including networks, servers, storage, application and services that can be easily provisioned and released. As Cloud is a shared and distributed environment, the …
- 230000004048 modification 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7393517B2 (en) | Systems and methods for ransomware detection and mitigation | |
US12041067B2 (en) | Behavior detection and verification | |
US10382200B2 (en) | Probabilistic key rotation | |
Chang et al. | Towards achieving data security with the cloud computing adoption framework | |
Khan et al. | Cloud log forensics: Foundations, state of the art, and future directions | |
US9348984B2 (en) | Method and system for protecting confidential information | |
Popoola et al. | Ransomware: Current trend, challenges, and research directions | |
Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
Gupta et al. | A light weight centralized file monitoring approach for securing files in cloud environment | |
Rana et al. | Ransomware attacks in cyber-physical systems: countermeasure of attack vectors through automated web defenses | |
Bakro et al. | Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms | |
Wale Amol et al. | Data Integrity Auditing of Cloud Storage | |
US20250233872A1 (en) | Dynamic security monitoring of user activities in networked backup storage systems | |
Alani | Security threats in cloud computing | |
Pitropakis et al. | It's All in the Cloud: Reviewing Cloud Security | |
Gupta et al. | A secure and lightweight approach for critical data security in cloud | |
Wang et al. | MobileGuardian: A security policy enforcement framework for mobile devices | |
Raghavendra et al. | Security issues and trends in cloud computing | |
Narain | Ransomware-rising menace to an unsuspecting cyber audience | |
Pandey | Security attacks in cloud computing | |
Azhar et al. | Big Data Security Issues: A Review | |
Landwehr | Engineered controls for dealing with big data | |
Mahalakshmi | Assessment on security issues and classification in cloud computing | |
Πιτροπάκης | Detecting malicious insider threat in cloud computing environments | |
USMAN | DEVELOPMENT OF A MODEL FOR USER-CENTRIC CYBER DISASTER RECOVERY |