Manasa et al., 2016 - Google Patents
An evidence multi-copy dynamic data possession in multi cloud computing systemManasa et al., 2016
- Document ID
- 9913323295868838270
- Author
- Manasa A
- Saritha S
- Publication year
- Publication venue
- 2016 International Conference on Communication and Electronics Systems (ICCES)
External Links
Snippet
Most of group vendor store unlimited quantity of their data in cloud with facility of retrieving. Users pay costs for storing data. Most of the users are in collaborative relationship; at that time data sharing and dynamic operation are useful to make robust productive benefits …
- 238000000034 method 0 description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102717212B1 (en) | Secure, multi-agency, loss-proof storage and transfer of cryptographic keys for blockchain-based systems linked to wallet management systems | |
CN104901942B (en) | A Distributed Access Control Method Based on Attribute Encryption | |
Szalachowski | Password-authenticated decentralized identities | |
Hoang et al. | Privacy-preserving blockchain-based data sharing platform for decentralized storage systems | |
CN107465681B (en) | Cloud computing big data privacy protection method | |
CN107332858B (en) | Cloud data storage method | |
Chen et al. | An approach to verifying data integrity for cloud storage | |
Harchol et al. | Distributed SSH key management with proactive RSA threshold signatures | |
Kumar et al. | Data outsourcing: A threat to confidentiality, integrity, and availability | |
CN111294349A (en) | Method and device for sharing data of Internet of things equipment | |
Mukundan et al. | Replicated Data Integrity Verification in Cloud. | |
Bhagyashri et al. | Privacy-preserving public auditing for secure cloud storage | |
Ramprasath et al. | Protected data sharing using attribute based encryption for remote data checking in cloud environment | |
JP6840685B2 (en) | Data sharing method, data sharing system, communication terminal, data sharing server, program | |
Hahn et al. | Verifiable outsourced decryption of encrypted data from heterogeneous trust networks | |
Bankar et al. | Identity based proxy re-encryption using forward security in cloud framework | |
Xu et al. | NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems | |
Khudaier et al. | A Review of Assured Data Deletion Security Techniques in Cloud Storage | |
Manasa et al. | An evidence multi-copy dynamic data possession in multi cloud computing system | |
George et al. | Improved multi‐party verification protocol with reduced computational overhead in cloud storage system | |
Dewan et al. | Secure data migration across cloud system using third party auditor (TPA) | |
Lavanya et al. | Anonymous data sharing scheme for dynamic groups in an untrusted cloud | |
Banerjee et al. | A nobel cryptosystem for group data sharing in cloud storage | |
Sathana et al. | Three level security system for dynamic group in cloud | |
Contiu | Applied Cryptographic Access Control for Untrusted Cloud Storage |