[go: up one dir, main page]

Sasmitha et al., 2023 - Google Patents

Trusted Cloud Service Framework for Cloud Computing Security

Sasmitha et al., 2023

Document ID
3872712875445676366
Author
Sasmitha
Suresh A
Publication year
Publication venue
International Conference On Innovative Computing And Communication

External Links

Snippet

Cloud computing is the pooling of several adaptive computing resources including servers, networks, storages, and services to provide users with convenient and timely access. IAM is a virtual server which manages user and resource rights and authorization. To control who …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Similar Documents

Publication Publication Date Title
Zissis et al. Addressing cloud computing security issues
Fugkeaw Enabling trust and privacy-preserving e-KYC system using blockchain
Nunez et al. Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services
Pachala et al. An improved security and privacy management system for data in multi-cloud environments using a hybrid approach
Kousalya et al. Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique
Singh et al. Cloud computing security using blockchain technology
Heiss et al. Trustworthy pre-processing of sensor data in data on-chaining workflows for blockchain-based IoT applications
Lou et al. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
George et al. Ethereum blockchain-based authentication approach for Data Sharing in Cloud Storage Model
Kamaraju et al. Best practices for cloud data protection and key management
Bingu et al. A comprehensive review on security and privacy preservation in cloud environment
Mohammad Encryption Strategies for Protecting Data in SaaS Applications
Banushri et al. Hyperledger blockchain and lightweight bcrypt symmetric key encryption to boost cloud computing security effectiveness
Suresha et al. Enhancing data security in cloud computing using threshold cryptography technique
Sasmitha et al. Trusted Cloud Service Framework for Cloud Computing Security
Hasimi Cost-effective solutions in cloud computing security
Yusufzai et al. A comparative study of cryptographic algorithms for cloud security
Siopi et al. DeCStor: A Framework for Privately and Securely Sharing Files Using a Public Blockchain
Pawar et al. Implementation of secure authentication scheme and access control in cloud computing
Gupta et al. Secure group data sharing with an efficient key management without re-encryption scheme in cloud computing
Dadzie et al. A Quick Survey of Security and Privacy Issues in Cloud and a Proposed Data-Centric Security Model for Data Security
Qureshi et al. Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud. Symmetry 2022, 14, 695
Ranjan et al. Improved technique for data confidentiality in cloud environment
Unki et al. Cp-abe based mobile cloud computing applicatıon for secure data sharing
Havisha et al. Cloud security-random attribute based encryption