[go: up one dir, main page]

Kumar Yadav et al., 2018 - Google Patents

An Efficient Approach for Security in Cloud Computing

Kumar Yadav et al., 2018

View PDF
Document ID
2369963012703430056
Author
Kumar Yadav A
Garg M
Ritika D
Publication year
Publication venue
International Journal of Advanced Studies of Scientific Research

External Links

Snippet

To provide the security to user data a model can be used in which elliptical curve cryptography can be used in addition to the cryptographic algorithm. In the current paper, elliptic curve cryptography is used with the AES algorithm. By using the AES user can store …
Continue reading at papers.ssrn.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
US12355864B1 (en) Trust framework against systematic cryptographic breach
US11374975B2 (en) TLS integration of post quantum cryptographic algorithms
US11620387B2 (en) Host attestation
Chaudhry et al. An improved anonymous authentication scheme for distributed mobile cloud computing services
US11184157B1 (en) Cryptographic key generation and deployment
US10797879B2 (en) Methods and systems to facilitate authentication of a user
US11190504B1 (en) Certificate-based service authorization
US10924267B2 (en) Validating keys derived from an oblivious pseudorandom function
Mann et al. Two-factor authentication for the Bitcoin protocol
US8745394B1 (en) Methods and systems for secure electronic communication
CA3127649A1 (en) Security system and related methods
JP2021516901A (en) Lost pseudo-random function in key management system
KR20170129549A (en) Method and Apparatus for Authenticated Key Exchange Using Password and Identity-based Signature
CN114143117B (en) Data processing method and device
WO2019110399A1 (en) Two-party signature device and method
CN117121435A (en) Connection elastic multi-factor authentication
Odelu et al. A secure anonymity preserving authentication scheme for roaming service in global mobility networks
Das et al. A decentralized open web cryptographic standard
Athena et al. An identity attribute–based encryption using elliptic curve digital signature for patient health record maintenance
Ogunleye et al. Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment
Aldosary et al. A secure authentication framework for consumer mobile crowdsourcing networks
Jebrane et al. An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption
Hena et al. A three-tier authentication scheme for kerberized hadoop environment
US12212578B2 (en) Partial payload encryption with integrity protection
Deng et al. N-for-1-Auth: N-wise Decentralized Authentication via One Authentication