Murthy, 2014 - Google Patents
Cryptographic secure cloud storage model with anonymous authentication and automatic file recoveryMurthy, 2014
View PDF- Document ID
- 12764862644003540973
- Author
- Murthy S
- Publication year
- Publication venue
- ICTACT journal on soft computing
External Links
Snippet
We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving …
- 238000011084 recovery 0 title description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11146541B2 (en) | Hierarchical data access techniques using derived cryptographic material | |
US10425223B2 (en) | Multiple authority key derivation | |
US9872067B2 (en) | Source identification for unauthorized copies of content | |
EP2396922B1 (en) | Trusted cloud computing and services framework | |
Zhou et al. | EverSSDI: blockchain-based framework for verification, authorisation and recovery of self-sovereign identity using smart contracts | |
JP2012518329A (en) | A framework for trusted cloud computing and services | |
Kumar et al. | Data outsourcing: A threat to confidentiality, integrity, and availability | |
Deng et al. | Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data | |
Murthy | Cryptographic secure cloud storage model with anonymous authentication and automatic file recovery | |
Srisakthi et al. | Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment | |
Abo-Alian et al. | Auditing-as-a-service for cloud storage | |
Thangavel et al. | An analysis of privacy preservation schemes in cloud computing | |
Sowmiya et al. | Secure cloud storage model with hidden policy attribute based access control | |
Kamboj et al. | DEDUP: Deduplication system for encrypted data in cloud | |
Divya et al. | A combined data storage with encryption and keyword based data retrieval using SCDS-TM model in cloud | |
Kumari et al. | A Review on Challenges of Security for Secure Data Storage in Cloud | |
Arya et al. | Data sharing for dynamic group in the cloud environment by using group signature approach | |
Noorjahan et al. | Recovery based TPA in cloud for providing security to outsourced data using CloudSim | |
George et al. | Safest Secure and Consistent Data Services in the Storage of Cloud Computing | |
Haldorai | AES Algorithm Based Data Possession in Cloud Using Blockchain | |
Qin et al. | Blockchain‐based secure deduplication of encrypted data supporting client‐side semantically secure encryption without trusted third party | |
Lin et al. | An Identity-Set-Based Provable Data Possession Scheme | |
Ashok Reddy et al. | Identity-Based Remote Data Integrity Checking Using Lattice Approach by Third-Party Auditor | |
Walker | Provable data possession (PDP) and proofs of retrievability (POR) of current big user data: Cryptographic schemes in cloud storage | |
Islam | A Practical Framework for Storing and Searching Encrypted Data on Cloud Storage |