Olanrewaju et al., 2016 - Google Patents
RFDA: Reliable framework for data administration based on split-merge policyOlanrewaju et al., 2016
View PDF- Document ID
- 18039092446335186697
- Author
- Olanrewaju R
- Khan B
- Baba A
- Mir R
- Lone S
- Publication year
- Publication venue
- 2016 SAI Computing Conference (SAI)
External Links
Snippet
Emerging technologies in cloud environment have not only increased its use but also posed some severe issues. These issues can cause considerable harm not only to data storage but also to the large amount of data in distributed file structure which are being used in …
- 238000000034 method 0 abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11444779B2 (en) | Techniques for securing application programming interface requests using multi-party digital signatures | |
US10462112B1 (en) | Secure distributed authentication data | |
Pavithra et al. | A survey on cloud security issues and blockchain | |
KR102037160B1 (en) | Data security operations with expectations | |
US9673979B1 (en) | Hierarchical, deterministic, one-time login tokens | |
Aguiar et al. | An overview of issues and recent developments in cloud computing and storage security | |
US20180176222A1 (en) | User friendly two factor authentication | |
CN114586315A (en) | Decentralized data authentication | |
US20190297147A1 (en) | Application-specific session authentication | |
US20210083873A1 (en) | Secure authorization for sensitive information | |
Kiraz | A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing | |
US12107961B2 (en) | Connection resilient multi-factor authentication | |
US11977620B2 (en) | Attestation of application identity for inter-app communications | |
US20240012933A1 (en) | Integration of identity access management infrastructure with zero-knowledge services | |
Khan et al. | SSM: Secure-Split-Merge data distribution in cloud infrastructure | |
US11146379B1 (en) | Credential chaining for shared compute environments | |
US11616780B2 (en) | Security protection against threats to network identity providers | |
Murray et al. | Cloud service security & application vulnerability | |
Khan et al. | A brief review on cloud computing authentication frameworks | |
Olanrewaju et al. | RFDA: Reliable framework for data administration based on split-merge policy | |
Kumar et al. | Multi-authentication for cloud security: A framework | |
Albaroodi et al. | A proposed framework for outsourcing and secure encrypted data on OpenStack object storage (Swift) | |
Gunadham et al. | Security concerns in cloud computing for knowledge management systems | |
Paudel | Data breach a cyber security issue in cloud | |
Hammami et al. | Security issues in cloud computing and associated alleviation approaches |