[go: up one dir, main page]

Singh et al., 2021 - Google Patents

Cloud computing security using blockchain technology

Singh et al., 2021

View PDF
Document ID
7578898156695971917
Author
Singh S
Manjhi P
Tiwari R
Publication year
Publication venue
Transforming Cybersecurity Solutions using Blockchain

External Links

Snippet

In 2006, cloud computing existed after Amazon's deployment of the first of its category of cloud services. Cloud computing is now simply the topmost in every record of existing theme as a research topic, for computer science in view of the fact that of its across-the-board …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves

Similar Documents

Publication Publication Date Title
Dasgupta et al. A survey of blockchain from security perspective
Battah et al. Blockchain-based multi-party authorization for accessing IPFS encrypted data
US11451392B2 (en) Token-based secure data management
EP3073670B1 (en) A system and a method for personal identification and verification
Ahmadjee et al. A study on blockchain architecture design decisions and their security attacks and threats
Kaur et al. Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS
KR20190075793A (en) Authentication System for Providing Instant Access Using Block Chain
Singh et al. Cloud computing security using blockchain technology
Adeniyi et al. Enhanced security and privacy issue in multi-tenant environment of green computing using blockchain technology
Neela et al. An improved RSA technique with efficient data integrity verification for outsourcing database in cloud
Praveena Anjelin et al. Blockchain technology for data sharing in decentralized storage system
Malhotra et al. Role of agents to enhance the security and scalability in cloud environment
AlFaw et al. Blockchain vulnerabilities and recent security challenges: A review paper
Gomathi et al. Rain drop service and biometric verification based blockchain technology for securing the bank transactions from cyber crimes using weighted fair blockchain (WFB) algorithm
Itnal et al. A secured healthcare medical system using blockchain technology
Patole et al. Personal identity on blockchain
Gattoju et al. Design of ChaApache framework for securing Hadoop application in big data
Banushri et al. Hyperledger blockchain and lightweight bcrypt symmetric key encryption to boost cloud computing security effectiveness
França et al. An introduction to blockchain technology and their applications in the actuality with a view of its security aspects
Chhabra et al. Blockchain, AI, and Data Protection in Healthcare: A Comparative Analysis of Two Blockchain Data Marketplaces in Relation to Fair Data Processing and the ‘Data Double-Spending’Problem
Gong et al. Toward Secure Data Storage in Web 3.0: Ciphertext-Policy Attribute-Based Encryption
Parisi et al. Wallet security
Gandhi et al. Blockchain technology: Concept, applications, challenges, and security threats
Hasimi Cost-effective solutions in cloud computing security
Mupila et al. An innovative authentication model for the enhancement of cloud security