[go: up one dir, main page]

Zhan et al., 2022 - Google Patents

Semi-Transparent Encryption to Prevent Leakage of Sensitive Information

Zhan et al., 2022

Document ID
1305644639927211610
Author
Zhan W
Luo X
Long F
Deng G
Publication year
Publication venue
2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC)

External Links

Snippet

With the continuous progress and development of science and technology, the application of computers has been popularized in all aspects of human life, providing great flexibility for human work and study. But at the same time, computer data security is also a big problem …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers

Similar Documents

Publication Publication Date Title
Chinnasamy et al. HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud
US10635824B1 (en) Methods and apparatus for private set membership using aggregation for reduced communications
US6981141B1 (en) Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files
CN109214201B (en) Data sharing method, terminal equipment and computer readable storage medium
CN110309674B (en) A Sorting Method Based on Fully Homomorphic Encryption
US10686764B2 (en) Executable coded cipher keys
US10158613B1 (en) Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
JP2002351742A (en) Data protecting device
Mittal et al. PData security using RSA encryption combined with image steganography
US10623384B2 (en) Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
Zhan et al. Semi-Transparent Encryption to Prevent Leakage of Sensitive Information
Mc Brearty et al. The performance cost of preserving data/query privacy using searchable symmetric encryption
Kalia et al. A hybrid approach for preserving privacy for real estate data
Sabbu et al. An oblivious image retrieval protocol
Seema et al. Encrypting security for virtualized environments in big data storage with generalized anonymization strategies
Patel A survey on security techniques used for confidentiality in cloud computing
Chawla et al. Study of image data security with cloud
Kedziora et al. Improved threat models for the security of encrypted and deniable file systems
Pattanshetti Review of Encryption Techniques to Enhance Data Protection in Cloud
Sathish et al. Scalable Data De-Duplication and Retrieval Using Public Key Encryption and Keyword Search Mechanisms
Vliegen et al. Hardware strengthening a distributed logging scheme
ALBALAWI et al. NEW ENCRYPTION ALGORITHM BASED ON ARTIFICIAL INTELLIGENCE’S FACE RECOGNITION, SYMMETRIC ENCRYPTION, AND STEGANOGRAPHY
Aliyu et al. Secure document and image transmission through an encrypted network system
Rajendran et al. An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data: Survey
Khara et al. A Dual-Layer Security Framework for Protecting Sensitive Medical Data in Digital Images