[go: up one dir, main page]

Ghorpade et al., 2017 - Google Patents

Notice of Violation of IEEE Publication Principles: Towards Achieving Efficient and Secure Way to Share the Data

Ghorpade et al., 2017

Document ID
3136128519255655292
Author
Ghorpade N
Vijaykarthik P
Dhananjaya V
Balasubramani R
Publication year
Publication venue
2017 IEEE 7th International Advance Computing Conference (IACC)

External Links

Snippet

Notice of Violation of IEEE Publication Principles" Towards Achieving Efficient and Secure Way to Share the Data" by Naveen Ghorpade, Vijaykarthik. P, Dhananjaya. V, Balasubramani. R in the Proceedings of the IEEE 7th International Advance Computing …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Similar Documents

Publication Publication Date Title
Kaaniche et al. A blockchain-based data usage auditing architecture with enhanced privacy and availability
Zhao et al. Trusted data sharing over untrusted cloud storage providers
US7715565B2 (en) Information-centric security
US20170244687A1 (en) Techniques for confidential delivery of random data over a network
CN104901942A (en) A Distributed Access Control Method Based on Attribute Encryption
CN101359991A (en) Identity-based public key cryptography private key escrow system
Kaaniche et al. ID based cryptography for cloud data storage
CN108111540A (en) The hierarchical access control system and method for data sharing are supported in a kind of cloud storage
Kumar et al. Privacy preserving data sharing in cloud using EAE technique
Ahammad et al. Key based secured cryptosystems used for online data sharing on the cloud
Kaaniche et al. Id-based user-centric data usage auditing scheme for distributed environments
Ghorpade et al. Notice of Violation of IEEE Publication Principles: Towards Achieving Efficient and Secure Way to Share the Data
Varghese et al. A varied approach to attribute based access model for secure storage in cloud
CN113556236A (en) Energy data middlebox sensitive content entrusting and authorizing method based on proxy signature
Mythili et al. Enhancing Role Based Access Control with Privacy in Cloud Computing.
Reddy et al. Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques
Mahalle et al. A review of secure data sharing in cloud using key aggregate cryptosystem and decoy technology
Zhang et al. Improved CP-ABE Algorithm Based on Identity and Access Control
Senthilkumar et al. ERAC-MAC efficient revocable access control for multi-authority cloud storage system
Feng et al. Secure data sharing solution for mobile cloud storage
Umaeswari et al. Multilevel security system for big data cloud using SDBS algorithm
Baviskar et al. Reliable and Efficient Revocation and Data Sharing using Identity-based Encryption over Cloud
Pei et al. Practical Data Sharing at Untrusted Stores
Baghel et al. Multilevel security model for cloud third-party authentication
Jahnavi et al. SECURE DATA SHARING IN CLOUD STORAGE FOR BIG DATA APPLICATION