Jan et al., 2022 - Google Patents
Securing the Cloud Storage by Using Different Algorithms of CryptographyJan et al., 2022
View PDF- Document ID
- 10414414396290032990
- Author
- Jan M
- Shahzad Q
- Afsar S
- Publication year
- Publication venue
- Int. J. Sci. Res. in Computer Science and Engineering Vol
External Links
Snippet
Accepted: 02/Apr/2022, Online: 30/Apr/2022 Abstract—Cloud Computing offers services via the internet that allows for virtual servers, dynamic memory pools, as well as easy access. Because distributed computing is based on the internet, security concerns such as …
- 238000000034 method 0 abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Chinnasamy et al. | Efficient data security using hybrid cryptography on cloud computing | |
| Bhardwaj et al. | Security algorithms for cloud computing | |
| Tawalbeh et al. | A secure cloud computing model based on data classification | |
| Ahmad et al. | Hybrid cryptography algorithms in cloud computing: A review | |
| Abdul Hussien et al. | [Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites | |
| CN116866029B (en) | Random number encryption data transmission method, device, computer equipment and storage medium | |
| Hossain et al. | Design and development of a novel symmetric algorithm for enhancing data security in cloud computing | |
| Yeboah-Ofori et al. | Enhancement of big data security in cloud computing using RSA algorithm | |
| US10686592B1 (en) | System and method to provide a secure communication of information | |
| Priyadharshini et al. | Efficient Key Management System Based Lightweight Devices in IoT. | |
| Jan et al. | Securing the Cloud Storage by Using Different Algorithms of Cryptography | |
| Kumari et al. | One time pad encryption technique in cryptography | |
| Shirole et al. | Review paper on data security in cloud computing environment | |
| Kodada | FSAaCIT: finite state automata based one-key cryptosystem and chunk-based indexing technique for secure data de-duplication in cloud computing | |
| Sharfuddin et al. | A novel cryptographic technique for cloud environment based on feedback DNA | |
| Latha et al. | Security scheme in cloud system using hyper elliptic curve and SIFT technique with QR code | |
| Agnihotri et al. | A secure document archive implemented using multiple encryption | |
| Vennela et al. | Performance analysis of cryptographic algorithms for cloud security | |
| Kanna et al. | A new approach in multi cloud environment to improve data security | |
| Jena et al. | Dual encryption model for preserving privacy in cloud computing | |
| Emdad et al. | A standard data security model using AES algorithm in cloud computing | |
| Bollipelly et al. | Blockchain-based messaging system for secure and private communication: Using blockchain and double AES encryption | |
| Sri et al. | Concealing the Data Using Cryptography | |
| Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques | |
| Anand et al. | Advanced Encryption Techniques for Protecting Sensitive Data in Multi Cloud Architecture: A Security First Approach |