Ghorpade et al., 2017 - Google Patents
Notice of Violation of IEEE Publication Principles: Towards Achieving Efficient and Secure Way to Share the DataGhorpade et al., 2017
- Document ID
- 3136128519255655292
- Author
- Ghorpade N
- Vijaykarthik P
- Dhananjaya V
- Balasubramani R
- Publication year
- Publication venue
- 2017 IEEE 7th International Advance Computing Conference (IACC)
External Links
Snippet
Notice of Violation of IEEE Publication Principles" Towards Achieving Efficient and Secure Way to Share the Data" by Naveen Ghorpade, Vijaykarthik. P, Dhananjaya. V, Balasubramani. R in the Proceedings of the IEEE 7th International Advance Computing …
- 238000000034 method 0 abstract description 29
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kaaniche et al. | A blockchain-based data usage auditing architecture with enhanced privacy and availability | |
Zhao et al. | Trusted data sharing over untrusted cloud storage providers | |
US7715565B2 (en) | Information-centric security | |
US20170244687A1 (en) | Techniques for confidential delivery of random data over a network | |
CN104901942A (en) | A Distributed Access Control Method Based on Attribute Encryption | |
CN101359991A (en) | Identity-based public key cryptography private key escrow system | |
Kaaniche et al. | ID based cryptography for cloud data storage | |
CN108111540A (en) | The hierarchical access control system and method for data sharing are supported in a kind of cloud storage | |
Kumar et al. | Privacy preserving data sharing in cloud using EAE technique | |
Ahammad et al. | Key based secured cryptosystems used for online data sharing on the cloud | |
Kaaniche et al. | Id-based user-centric data usage auditing scheme for distributed environments | |
Ghorpade et al. | Notice of Violation of IEEE Publication Principles: Towards Achieving Efficient and Secure Way to Share the Data | |
Varghese et al. | A varied approach to attribute based access model for secure storage in cloud | |
CN113556236A (en) | Energy data middlebox sensitive content entrusting and authorizing method based on proxy signature | |
Mythili et al. | Enhancing Role Based Access Control with Privacy in Cloud Computing. | |
Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques | |
Mahalle et al. | A review of secure data sharing in cloud using key aggregate cryptosystem and decoy technology | |
Zhang et al. | Improved CP-ABE Algorithm Based on Identity and Access Control | |
Senthilkumar et al. | ERAC-MAC efficient revocable access control for multi-authority cloud storage system | |
Feng et al. | Secure data sharing solution for mobile cloud storage | |
Umaeswari et al. | Multilevel security system for big data cloud using SDBS algorithm | |
Baviskar et al. | Reliable and Efficient Revocation and Data Sharing using Identity-based Encryption over Cloud | |
Pei et al. | Practical Data Sharing at Untrusted Stores | |
Baghel et al. | Multilevel security model for cloud third-party authentication | |
Jahnavi et al. | SECURE DATA SHARING IN CLOUD STORAGE FOR BIG DATA APPLICATION |