Singh et al., 2021 - Google Patents
Cloud computing security using blockchain technologySingh et al., 2021
View PDF- Document ID
- 7578898156695971917
- Author
- Singh S
- Manjhi P
- Tiwari R
- Publication year
- Publication venue
- Transforming Cybersecurity Solutions using Blockchain
External Links
Snippet
In 2006, cloud computing existed after Amazon's deployment of the first of its category of cloud services. Cloud computing is now simply the topmost in every record of existing theme as a research topic, for computer science in view of the fact that of its across-the-board …
- 238000005516 engineering process 0 title abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dasgupta et al. | A survey of blockchain from security perspective | |
Battah et al. | Blockchain-based multi-party authorization for accessing IPFS encrypted data | |
US11451392B2 (en) | Token-based secure data management | |
EP3073670B1 (en) | A system and a method for personal identification and verification | |
Ahmadjee et al. | A study on blockchain architecture design decisions and their security attacks and threats | |
Kaur et al. | Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS | |
KR20190075793A (en) | Authentication System for Providing Instant Access Using Block Chain | |
Singh et al. | Cloud computing security using blockchain technology | |
Adeniyi et al. | Enhanced security and privacy issue in multi-tenant environment of green computing using blockchain technology | |
Neela et al. | An improved RSA technique with efficient data integrity verification for outsourcing database in cloud | |
Praveena Anjelin et al. | Blockchain technology for data sharing in decentralized storage system | |
Malhotra et al. | Role of agents to enhance the security and scalability in cloud environment | |
AlFaw et al. | Blockchain vulnerabilities and recent security challenges: A review paper | |
Gomathi et al. | Rain drop service and biometric verification based blockchain technology for securing the bank transactions from cyber crimes using weighted fair blockchain (WFB) algorithm | |
Itnal et al. | A secured healthcare medical system using blockchain technology | |
Patole et al. | Personal identity on blockchain | |
Gattoju et al. | Design of ChaApache framework for securing Hadoop application in big data | |
Banushri et al. | Hyperledger blockchain and lightweight bcrypt symmetric key encryption to boost cloud computing security effectiveness | |
França et al. | An introduction to blockchain technology and their applications in the actuality with a view of its security aspects | |
Chhabra et al. | Blockchain, AI, and Data Protection in Healthcare: A Comparative Analysis of Two Blockchain Data Marketplaces in Relation to Fair Data Processing and the ‘Data Double-Spending’Problem | |
Gong et al. | Toward Secure Data Storage in Web 3.0: Ciphertext-Policy Attribute-Based Encryption | |
Parisi et al. | Wallet security | |
Gandhi et al. | Blockchain technology: Concept, applications, challenges, and security threats | |
Hasimi | Cost-effective solutions in cloud computing security | |
Mupila et al. | An innovative authentication model for the enhancement of cloud security |