[go: up one dir, main page]

Murthy, 2014 - Google Patents

Cryptographic secure cloud storage model with anonymous authentication and automatic file recovery

Murthy, 2014

View PDF
Document ID
12764862644003540973
Author
Murthy S
Publication year
Publication venue
ICTACT journal on soft computing

External Links

Snippet

We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving …
Continue reading at ictactjournals.in (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Similar Documents

Publication Publication Date Title
US11146541B2 (en) Hierarchical data access techniques using derived cryptographic material
US10425223B2 (en) Multiple authority key derivation
US9872067B2 (en) Source identification for unauthorized copies of content
EP2396922B1 (en) Trusted cloud computing and services framework
Zhou et al. EverSSDI: blockchain-based framework for verification, authorisation and recovery of self-sovereign identity using smart contracts
JP2012518329A (en) A framework for trusted cloud computing and services
Kumar et al. Data outsourcing: A threat to confidentiality, integrity, and availability
Deng et al. Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data
Murthy Cryptographic secure cloud storage model with anonymous authentication and automatic file recovery
Srisakthi et al. Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment
Abo-Alian et al. Auditing-as-a-service for cloud storage
Thangavel et al. An analysis of privacy preservation schemes in cloud computing
Sowmiya et al. Secure cloud storage model with hidden policy attribute based access control
Kamboj et al. DEDUP: Deduplication system for encrypted data in cloud
Divya et al. A combined data storage with encryption and keyword based data retrieval using SCDS-TM model in cloud
Kumari et al. A Review on Challenges of Security for Secure Data Storage in Cloud
Arya et al. Data sharing for dynamic group in the cloud environment by using group signature approach
Noorjahan et al. Recovery based TPA in cloud for providing security to outsourced data using CloudSim
George et al. Safest Secure and Consistent Data Services in the Storage of Cloud Computing
Haldorai AES Algorithm Based Data Possession in Cloud Using Blockchain
Qin et al. Blockchain‐based secure deduplication of encrypted data supporting client‐side semantically secure encryption without trusted third party
Lin et al. An Identity-Set-Based Provable Data Possession Scheme
Ashok Reddy et al. Identity-Based Remote Data Integrity Checking Using Lattice Approach by Third-Party Auditor
Walker Provable data possession (PDP) and proofs of retrievability (POR) of current big user data: Cryptographic schemes in cloud storage
Islam A Practical Framework for Storing and Searching Encrypted Data on Cloud Storage