Sasmitha et al., 2023 - Google Patents
Trusted Cloud Service Framework for Cloud Computing SecuritySasmitha et al., 2023
- Document ID
- 3872712875445676366
- Author
- Sasmitha
- Suresh A
- Publication year
- Publication venue
- International Conference On Innovative Computing And Communication
External Links
Snippet
Cloud computing is the pooling of several adaptive computing resources including servers, networks, storages, and services to provide users with convenient and timely access. IAM is a virtual server which manages user and resource rights and authorization. To control who …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zissis et al. | Addressing cloud computing security issues | |
Fugkeaw | Enabling trust and privacy-preserving e-KYC system using blockchain | |
Nunez et al. | Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services | |
Pachala et al. | An improved security and privacy management system for data in multi-cloud environments using a hybrid approach | |
Kousalya et al. | Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique | |
Singh et al. | Cloud computing security using blockchain technology | |
Heiss et al. | Trustworthy pre-processing of sensor data in data on-chaining workflows for blockchain-based IoT applications | |
Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
George et al. | Ethereum blockchain-based authentication approach for Data Sharing in Cloud Storage Model | |
Kamaraju et al. | Best practices for cloud data protection and key management | |
Bingu et al. | A comprehensive review on security and privacy preservation in cloud environment | |
Mohammad | Encryption Strategies for Protecting Data in SaaS Applications | |
Banushri et al. | Hyperledger blockchain and lightweight bcrypt symmetric key encryption to boost cloud computing security effectiveness | |
Suresha et al. | Enhancing data security in cloud computing using threshold cryptography technique | |
Sasmitha et al. | Trusted Cloud Service Framework for Cloud Computing Security | |
Hasimi | Cost-effective solutions in cloud computing security | |
Yusufzai et al. | A comparative study of cryptographic algorithms for cloud security | |
Siopi et al. | DeCStor: A Framework for Privately and Securely Sharing Files Using a Public Blockchain | |
Pawar et al. | Implementation of secure authentication scheme and access control in cloud computing | |
Gupta et al. | Secure group data sharing with an efficient key management without re-encryption scheme in cloud computing | |
Dadzie et al. | A Quick Survey of Security and Privacy Issues in Cloud and a Proposed Data-Centric Security Model for Data Security | |
Qureshi et al. | Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud. Symmetry 2022, 14, 695 | |
Ranjan et al. | Improved technique for data confidentiality in cloud environment | |
Unki et al. | Cp-abe based mobile cloud computing applicatıon for secure data sharing | |
Havisha et al. | Cloud security-random attribute based encryption |