[go: up one dir, main page]

Gupta et al., 2012 - Google Patents

A secure and lightweight approach for critical data security in cloud

Gupta et al., 2012

View PDF
Document ID
7499148990575828409
Author
Gupta S
Kumar P
Sardana A
Abraham A
Publication year
Publication venue
2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)

External Links

Snippet

Cloud computing is a model that provides ubiquitous, on demand access to a shared pool of computing resources including networks, servers, storage, application and services that can be easily provisioned and released. As Cloud is a shared and distributed environment, the …
Continue reading at 2fwww.softcomputing.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
JP7393517B2 (en) Systems and methods for ransomware detection and mitigation
US12041067B2 (en) Behavior detection and verification
US10382200B2 (en) Probabilistic key rotation
Chang et al. Towards achieving data security with the cloud computing adoption framework
Khan et al. Cloud log forensics: Foundations, state of the art, and future directions
US9348984B2 (en) Method and system for protecting confidential information
Popoola et al. Ransomware: Current trend, challenges, and research directions
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
Gupta et al. A light weight centralized file monitoring approach for securing files in cloud environment
Rana et al. Ransomware attacks in cyber-physical systems: countermeasure of attack vectors through automated web defenses
Bakro et al. Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms
Wale Amol et al. Data Integrity Auditing of Cloud Storage
US20250233872A1 (en) Dynamic security monitoring of user activities in networked backup storage systems
Alani Security threats in cloud computing
Pitropakis et al. It's All in the Cloud: Reviewing Cloud Security
Gupta et al. A secure and lightweight approach for critical data security in cloud
Wang et al. MobileGuardian: A security policy enforcement framework for mobile devices
Raghavendra et al. Security issues and trends in cloud computing
Narain Ransomware-rising menace to an unsuspecting cyber audience
Pandey Security attacks in cloud computing
Azhar et al. Big Data Security Issues: A Review
Landwehr Engineered controls for dealing with big data
Mahalakshmi Assessment on security issues and classification in cloud computing
Πιτροπάκης Detecting malicious insider threat in cloud computing environments
USMAN DEVELOPMENT OF A MODEL FOR USER-CENTRIC CYBER DISASTER RECOVERY