Zhan et al., 2022 - Google Patents
Semi-Transparent Encryption to Prevent Leakage of Sensitive InformationZhan et al., 2022
- Document ID
- 1305644639927211610
- Author
- Zhan W
- Luo X
- Long F
- Deng G
- Publication year
- Publication venue
- 2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC)
External Links
Snippet
With the continuous progress and development of science and technology, the application of computers has been popularized in all aspects of human life, providing great flexibility for human work and study. But at the same time, computer data security is also a big problem …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chinnasamy et al. | HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud | |
US10635824B1 (en) | Methods and apparatus for private set membership using aggregation for reduced communications | |
US6981141B1 (en) | Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files | |
CN109214201B (en) | Data sharing method, terminal equipment and computer readable storage medium | |
CN110309674B (en) | A Sorting Method Based on Fully Homomorphic Encryption | |
US10686764B2 (en) | Executable coded cipher keys | |
US10158613B1 (en) | Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys | |
JP2002351742A (en) | Data protecting device | |
Mittal et al. | PData security using RSA encryption combined with image steganography | |
US10623384B2 (en) | Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys | |
Zhan et al. | Semi-Transparent Encryption to Prevent Leakage of Sensitive Information | |
Mc Brearty et al. | The performance cost of preserving data/query privacy using searchable symmetric encryption | |
Kalia et al. | A hybrid approach for preserving privacy for real estate data | |
Sabbu et al. | An oblivious image retrieval protocol | |
Seema et al. | Encrypting security for virtualized environments in big data storage with generalized anonymization strategies | |
Patel | A survey on security techniques used for confidentiality in cloud computing | |
Chawla et al. | Study of image data security with cloud | |
Kedziora et al. | Improved threat models for the security of encrypted and deniable file systems | |
Pattanshetti | Review of Encryption Techniques to Enhance Data Protection in Cloud | |
Sathish et al. | Scalable Data De-Duplication and Retrieval Using Public Key Encryption and Keyword Search Mechanisms | |
Vliegen et al. | Hardware strengthening a distributed logging scheme | |
ALBALAWI et al. | NEW ENCRYPTION ALGORITHM BASED ON ARTIFICIAL INTELLIGENCE’S FACE RECOGNITION, SYMMETRIC ENCRYPTION, AND STEGANOGRAPHY | |
Aliyu et al. | Secure document and image transmission through an encrypted network system | |
Rajendran et al. | An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data: Survey | |
Khara et al. | A Dual-Layer Security Framework for Protecting Sensitive Medical Data in Digital Images |