Malgey et al. - Google Patents
A Security Model for Effective Secure Cloud Computing EnvironmentMalgey et al.
View PDF- Document ID
- 18340612978188193779
- Author
- Malgey S
- Chauhan M
- Purohit P
External Links
Snippet
The cloud computing is a technology helps to organize and manage resources and services. Cloud based Web applications help for enabling convenient and on demand resource access with resource shared pool. Cloud computing applications provide computation …
- 238000005516 engineering process 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Rong et al. | Beyond lightning: A survey on security challenges in cloud computing | |
| Mohiuddin et al. | Secure distributed adaptive bin packing algorithm for cloud storage | |
| Khan et al. | SSM: Secure-Split-Merge data distribution in cloud infrastructure | |
| Boopathy et al. | Data encryption framework model with watermark security for data storage in public cloud model | |
| Ahamed et al. | Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography. | |
| Yau et al. | Protection of users' data confidentiality in cloud computing | |
| Abd et al. | A review of cloud security based on cryptographic mechanisms | |
| Bobde et al. | An approach for securing data on Cloud using data slicing and cryptography | |
| Malgey et al. | A Security Model for Effective Secure Cloud Computing Environment | |
| Goyal et al. | MD5 and ECC Encryption based framework for Cloud Computing Services | |
| Benard et al. | A Review on Data Security and Emerging Threats in Cloud Computing | |
| Mishra et al. | Improved cloud security approach with threshold cryptography | |
| JP6965885B2 (en) | Information processing equipment, information processing methods, and programs | |
| Mudgal et al. | ‘International journal of engineering sciences & research technology enhancing data security using encryption and splitting technique over multi-cloud environment | |
| Boopathy et al. | Securing public data storage in cloud environment | |
| Raja et al. | An enhanced study on cloud data services using security technologies | |
| Ranawat et al. | An enhanced encryption scheme for cloud security | |
| HASSAN BIJIK | A review on securing distributed Big Data Storage in Cloud Environment | |
| Sagar et al. | Survey on Various Cloud Security Approaches. | |
| Sri et al. | A Framework for Uncertain Cloud Data Security and Recovery Based on Hybrid Multi-User Medical Decision Learning Patterns | |
| Gopalakrishnan et al. | Privacy Perseving Cloud Storage Three Layer Scheme Based on Computational Intelligence in Fog Computing | |
| Geetha Rani et al. | Contrasting Various Cryptographic Algorithms for Storage and Cloud Computing Services | |
| Gorata et al. | Design andImplementation of Security in Healthcare Cloud Computing | |
| KC et al. | Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment | |
| Sasmitha et al. | Trusted Cloud Service Framework for Cloud Computing Security |