[go: up one dir, main page]

Malgey et al. - Google Patents

A Security Model for Effective Secure Cloud Computing Environment

Malgey et al.

View PDF
Document ID
18340612978188193779
Author
Malgey S
Chauhan M
Purohit P

External Links

Snippet

The cloud computing is a technology helps to organize and manage resources and services. Cloud based Web applications help for enabling convenient and on demand resource access with resource shared pool. Cloud computing applications provide computation …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Similar Documents

Publication Publication Date Title
Rong et al. Beyond lightning: A survey on security challenges in cloud computing
Mohiuddin et al. Secure distributed adaptive bin packing algorithm for cloud storage
Khan et al. SSM: Secure-Split-Merge data distribution in cloud infrastructure
Boopathy et al. Data encryption framework model with watermark security for data storage in public cloud model
Ahamed et al. Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography.
Yau et al. Protection of users' data confidentiality in cloud computing
Abd et al. A review of cloud security based on cryptographic mechanisms
Bobde et al. An approach for securing data on Cloud using data slicing and cryptography
Malgey et al. A Security Model for Effective Secure Cloud Computing Environment
Goyal et al. MD5 and ECC Encryption based framework for Cloud Computing Services
Benard et al. A Review on Data Security and Emerging Threats in Cloud Computing
Mishra et al. Improved cloud security approach with threshold cryptography
JP6965885B2 (en) Information processing equipment, information processing methods, and programs
Mudgal et al. ‘International journal of engineering sciences & research technology enhancing data security using encryption and splitting technique over multi-cloud environment
Boopathy et al. Securing public data storage in cloud environment
Raja et al. An enhanced study on cloud data services using security technologies
Ranawat et al. An enhanced encryption scheme for cloud security
HASSAN BIJIK A review on securing distributed Big Data Storage in Cloud Environment
Sagar et al. Survey on Various Cloud Security Approaches.
Sri et al. A Framework for Uncertain Cloud Data Security and Recovery Based on Hybrid Multi-User Medical Decision Learning Patterns
Gopalakrishnan et al. Privacy Perseving Cloud Storage Three Layer Scheme Based on Computational Intelligence in Fog Computing
Geetha Rani et al. Contrasting Various Cryptographic Algorithms for Storage and Cloud Computing Services
Gorata et al. Design andImplementation of Security in Healthcare Cloud Computing
KC et al. Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment
Sasmitha et al. Trusted Cloud Service Framework for Cloud Computing Security