Saraswathi et al., 2017 - Google Patents
A Secured Storage using AES Algorithm and Role Based Access in CloudSaraswathi et al., 2017
View PDF- Document ID
- 17512900703095419979
- Author
- Saraswathi M
- Bhuvaneswari T
- Publication year
- Publication venue
- Int. J. Sci. Res. Sci. Eng. Technol
External Links
Snippet
Cloud computing provides lot of advantages such as on demand service, cost effectiveness, elasticity, scalable, pay per use. One of the main drawback of cloud computing is data security. when data migrate to the cloud, is fully controlled by cloud service provider not by …
- 238000000034 method 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6941146B2 (en) | Data security service | |
Murala et al. | Secure dynamic groups data sharing with modified revocable attribute-based encryption in cloud | |
US20140229732A1 (en) | Data security service | |
Vegesna | Investigations on different security techniques for data protection in cloud computing using cryptography schemes | |
Sundari et al. | Secure multi-party computation in differential private data with Data Integrity Protection | |
Choubey et al. | Study of data security and privacy preserving solutions in cloud computing | |
Sankari et al. | Dynamic access control through cryptography in cloud | |
Suthar et al. | EncryScation: A novel framework for cloud iaas, daas security using encryption and obfuscation techniques | |
Saraswathi et al. | A Secured Storage using AES Algorithm and Role Based Access in Cloud | |
Charanya et al. | Attribute based encryption for secure sharing of E-health data | |
Galibus et al. | Cloud storage security | |
Sawle et al. | Survey on data classification and data encryption techniques used in cloud computing | |
Bhise et al. | Developing secure cloud storage system by integrating trust and cryptographic algorithms with role based access control | |
Abirami et al. | Efficient method for storing health record in cloud using integrity auditing and data sharing | |
Raja et al. | An enhanced study on cloud data services using security technologies | |
Ramane et al. | A metadata verification scheme for data auditing in cloud environment | |
Ashok Reddy et al. | Identity-Based Remote Data Integrity Checking Using Lattice Approach by Third-Party Auditor | |
Anusha et al. | Two factor protection for accessing data using efficient revocation in cloud storage system | |
Pashte et al. | Overcome Key Escrow Problem with Attribute-Based Data Access Policy & Efficient Cloud Environment | |
Thakur et al. | Data Security: Vital Demand in Cloud Computing | |
Praseetha | MODIFIED SECURE STORAGE AND ERASURE (SSE) PROTOCOL FOR DELETING SECRET DATA. | |
Mulimani et al. | Preserving Anonymity in Cloud Environment | |
Kavitha et al. | Scalable and Efficient Audit Service for Storage Data in Cloud Using Attribute Based Encryption | |
Urs et al. | Comparitive study on existing and proposed system of access control with anonymous authentication of DA TA stored | |
Vikas et al. | Secure of Data on stored Cloud from Decentralized Access Control with Anonymous Authentication |