[go: up one dir, main page]

Manasa et al., 2016 - Google Patents

An evidence multi-copy dynamic data possession in multi cloud computing system

Manasa et al., 2016

Document ID
9913323295868838270
Author
Manasa A
Saritha S
Publication year
Publication venue
2016 International Conference on Communication and Electronics Systems (ICCES)

External Links

Snippet

Most of group vendor store unlimited quantity of their data in cloud with facility of retrieving. Users pay costs for storing data. Most of the users are in collaborative relationship; at that time data sharing and dynamic operation are useful to make robust productive benefits …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Similar Documents

Publication Publication Date Title
KR102717212B1 (en) Secure, multi-agency, loss-proof storage and transfer of cryptographic keys for blockchain-based systems linked to wallet management systems
CN104901942B (en) A Distributed Access Control Method Based on Attribute Encryption
Szalachowski Password-authenticated decentralized identities
Hoang et al. Privacy-preserving blockchain-based data sharing platform for decentralized storage systems
CN107465681B (en) Cloud computing big data privacy protection method
CN107332858B (en) Cloud data storage method
Chen et al. An approach to verifying data integrity for cloud storage
Harchol et al. Distributed SSH key management with proactive RSA threshold signatures
Kumar et al. Data outsourcing: A threat to confidentiality, integrity, and availability
CN111294349A (en) Method and device for sharing data of Internet of things equipment
Mukundan et al. Replicated Data Integrity Verification in Cloud.
Bhagyashri et al. Privacy-preserving public auditing for secure cloud storage
Ramprasath et al. Protected data sharing using attribute based encryption for remote data checking in cloud environment
JP6840685B2 (en) Data sharing method, data sharing system, communication terminal, data sharing server, program
Hahn et al. Verifiable outsourced decryption of encrypted data from heterogeneous trust networks
Bankar et al. Identity based proxy re-encryption using forward security in cloud framework
Xu et al. NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems
Khudaier et al. A Review of Assured Data Deletion Security Techniques in Cloud Storage
Manasa et al. An evidence multi-copy dynamic data possession in multi cloud computing system
George et al. Improved multi‐party verification protocol with reduced computational overhead in cloud storage system
Dewan et al. Secure data migration across cloud system using third party auditor (TPA)
Lavanya et al. Anonymous data sharing scheme for dynamic groups in an untrusted cloud
Banerjee et al. A nobel cryptosystem for group data sharing in cloud storage
Sathana et al. Three level security system for dynamic group in cloud
Contiu Applied Cryptographic Access Control for Untrusted Cloud Storage