Charanya et al., 2017 - Google Patents
Attribute based encryption for secure sharing of E-health dataCharanya et al., 2017
View PDF- Document ID
- 3886007010749711924
- Author
- Charanya R
- Nithya S
- Manikandan N
- Publication year
- Publication venue
- IOP Conference Series: Materials Science and Engineering
External Links
Snippet
Distributed computing is one of the developing innovations in IT part and information security assumes a real part. It includes sending gathering of remote server and programming that permit the unified information and online access to PC administrations …
- 238000000034 method 0 abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
- G06F9/5055—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering software capabilities, i.e. software resources associated or available to the machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109144961B (en) | Authorization file sharing method and device | |
CN109559124B (en) | Cloud data security sharing method based on block chain | |
Hoang et al. | Privacy-preserving blockchain-based data sharing platform for decentralized storage systems | |
Gajmal et al. | Blockchain-based access control and data sharing mechanism in cloud decentralized storage system | |
KR20210058313A (en) | Data access control method and system using attribute-based password for secure and efficient data sharing in cloud environment | |
Fugkeaw et al. | Secure and fine-grained access control with optimized revocation for outsourced IoT EHRs with adaptive load-sharing in fog-assisted cloud environment | |
Guo et al. | Using blockchain to control access to cloud data | |
CN117879819A (en) | Key management method, device, storage medium, equipment and computing power service system | |
Pachala et al. | l-PEES-IMP: lightweight proxy re-encryption-based identity management protocol for enhancing privacy over multi-cloud environment | |
Charanya et al. | Attribute based encryption for secure sharing of E-health data | |
US11481515B2 (en) | Confidential computing workflows | |
Ramachandran et al. | Secure and efficient data forwarding in untrusted cloud environment | |
Sankari et al. | Dynamic access control through cryptography in cloud | |
Mohit et al. | Confidentiality and storage of data in cloud environment | |
Chennam et al. | Cloud security in crypt database server using fine grained access control | |
Yasmin et al. | Decentralized Entrance Power with Secret Endorsement of Data Stored in Clouds | |
Saraswathi et al. | A Secured Storage using AES Algorithm and Role Based Access in Cloud | |
Srikanth et al. | Proxy-Based Re-Encryption Design for the IoT Ecosystem | |
Mudgal et al. | ‘International journal of engineering sciences & research technology enhancing data security using encryption and splitting technique over multi-cloud environment | |
Mounnan et al. | Efficient distributed access control using blockchain for big data in clouds | |
Das | Fine‐Grained Access Through Attribute‐Based Encryption for Fog Computing | |
Asesh | Encryption technique for a trusted cloud computing environment | |
US20250112758A1 (en) | Artificial Intelligence (AI) Based Cloud Architecture Segmentation Leveraging Homomorphic Encryption | |
Pitchay et al. | Mobile application design for protecting the data in cloud using enhanced technique of encryption | |
Bagyalakshmi et al. | A survey on attribute-based encryption techniques in data security using cloud environment |