Kumar Yadav et al., 2018 - Google Patents
An Efficient Approach for Security in Cloud ComputingKumar Yadav et al., 2018
View PDF- Document ID
- 2369963012703430056
- Author
- Kumar Yadav A
- Garg M
- Ritika D
- Publication year
- Publication venue
- International Journal of Advanced Studies of Scientific Research
External Links
Snippet
To provide the security to user data a model can be used in which elliptical curve cryptography can be used in addition to the cryptographic algorithm. In the current paper, elliptic curve cryptography is used with the AES algorithm. By using the AES user can store …
- 238000000034 method 0 description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12355864B1 (en) | Trust framework against systematic cryptographic breach | |
US11374975B2 (en) | TLS integration of post quantum cryptographic algorithms | |
US11620387B2 (en) | Host attestation | |
Chaudhry et al. | An improved anonymous authentication scheme for distributed mobile cloud computing services | |
US11184157B1 (en) | Cryptographic key generation and deployment | |
US10797879B2 (en) | Methods and systems to facilitate authentication of a user | |
US11190504B1 (en) | Certificate-based service authorization | |
US10924267B2 (en) | Validating keys derived from an oblivious pseudorandom function | |
Mann et al. | Two-factor authentication for the Bitcoin protocol | |
US8745394B1 (en) | Methods and systems for secure electronic communication | |
CA3127649A1 (en) | Security system and related methods | |
JP2021516901A (en) | Lost pseudo-random function in key management system | |
KR20170129549A (en) | Method and Apparatus for Authenticated Key Exchange Using Password and Identity-based Signature | |
CN114143117B (en) | Data processing method and device | |
WO2019110399A1 (en) | Two-party signature device and method | |
CN117121435A (en) | Connection elastic multi-factor authentication | |
Odelu et al. | A secure anonymity preserving authentication scheme for roaming service in global mobility networks | |
Das et al. | A decentralized open web cryptographic standard | |
Athena et al. | An identity attribute–based encryption using elliptic curve digital signature for patient health record maintenance | |
Ogunleye et al. | Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment | |
Aldosary et al. | A secure authentication framework for consumer mobile crowdsourcing networks | |
Jebrane et al. | An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption | |
Hena et al. | A three-tier authentication scheme for kerberized hadoop environment | |
US12212578B2 (en) | Partial payload encryption with integrity protection | |
Deng et al. | N-for-1-Auth: N-wise Decentralized Authentication via One Authentication |