More et al., 2016 - Google Patents
Third party public auditing scheme for cloud storageMore et al., 2016
View PDF- Document ID
- 1204637110176952022
- Author
- More S
- Chaudhari S
- Publication year
- Publication venue
- Procedia Computer Science
External Links
Snippet
Cloud storage is one of the service provided by Cloud computing in which data is maintained, managed, backed up remotely and made available to users over a network (typically the Internet). The user is concerned about the integrity of data stored in the cloud …
- 238000004364 calculation method 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| More et al. | Third party public auditing scheme for cloud storage | |
| US10652015B2 (en) | Confidential communication management | |
| Kumar et al. | TPA auditing to enhance the privacy and security in cloud systems | |
| Kumar et al. | A systematic review of the security in cloud computing: data integrity, confidentiality and availability | |
| Hiremath et al. | A novel data auditing approach to achieve data privacy and data integrity in cloud computing | |
| Sugumaran et al. | An architecture for data security in cloud computing | |
| Nayak et al. | An improved mutual authentication framework for cloud computing | |
| Kumar et al. | Data outsourcing: A threat to confidentiality, integrity, and availability | |
| Junghanns et al. | Engineering of secure multi-cloud storage | |
| Vrana | Cyber security and data ownership | |
| Ramprasath et al. | Protected data sharing using attribute based encryption for remote data checking in cloud environment | |
| More et al. | Secure and efficient public auditing scheme for cloud storage | |
| Adokshaja et al. | Third party public auditing on cloud storage using the cryptographic algorithm | |
| Jabbar et al. | Design and implementation of hybrid EC-RSA security algorithm based on TPA for cloud storage | |
| Navajothi et al. | An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage | |
| Shah et al. | Third party public auditing scheme for security in cloud storage | |
| Patil et al. | Efficient privacy preserving and dynamic public auditing for storage cloud | |
| Vijay et al. | An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol | |
| Arvin S. Lat et al. | SOUL System: secure online USB login system | |
| Jakhotia et al. | Novel architecture for enabling proof of retrievability using AES algorithm | |
| Prasanthi et al. | An Efficient Auditing Protocol for Secure Data Storage in Cloud Computing | |
| Arora et al. | Mathematical foundations of data security in cloud environment | |
| Banerjee et al. | A nobel cryptosystem for group data sharing in cloud storage | |
| Chikezie et al. | Mitigating Malicious Software Threat in Cloud Computing Models Using-Multi-Factor-Authentication-in-Cloud-Computing | |
| Bolannavar | Privacy-Preserving Public Auditing using TPA for Secure Cloud Storage |