+

More et al., 2016 - Google Patents

Third party public auditing scheme for cloud storage

More et al., 2016

View PDF
Document ID
1204637110176952022
Author
More S
Chaudhari S
Publication year
Publication venue
Procedia Computer Science

External Links

Snippet

Cloud storage is one of the service provided by Cloud computing in which data is maintained, managed, backed up remotely and made available to users over a network (typically the Internet). The user is concerned about the integrity of data stored in the cloud …
Continue reading at www.sciencedirect.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Similar Documents

Publication Publication Date Title
More et al. Third party public auditing scheme for cloud storage
US10652015B2 (en) Confidential communication management
Kumar et al. TPA auditing to enhance the privacy and security in cloud systems
Kumar et al. A systematic review of the security in cloud computing: data integrity, confidentiality and availability
Hiremath et al. A novel data auditing approach to achieve data privacy and data integrity in cloud computing
Sugumaran et al. An architecture for data security in cloud computing
Nayak et al. An improved mutual authentication framework for cloud computing
Kumar et al. Data outsourcing: A threat to confidentiality, integrity, and availability
Junghanns et al. Engineering of secure multi-cloud storage
Vrana Cyber security and data ownership
Ramprasath et al. Protected data sharing using attribute based encryption for remote data checking in cloud environment
More et al. Secure and efficient public auditing scheme for cloud storage
Adokshaja et al. Third party public auditing on cloud storage using the cryptographic algorithm
Jabbar et al. Design and implementation of hybrid EC-RSA security algorithm based on TPA for cloud storage
Navajothi et al. An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage
Shah et al. Third party public auditing scheme for security in cloud storage
Patil et al. Efficient privacy preserving and dynamic public auditing for storage cloud
Vijay et al. An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol
Arvin S. Lat et al. SOUL System: secure online USB login system
Jakhotia et al. Novel architecture for enabling proof of retrievability using AES algorithm
Prasanthi et al. An Efficient Auditing Protocol for Secure Data Storage in Cloud Computing
Arora et al. Mathematical foundations of data security in cloud environment
Banerjee et al. A nobel cryptosystem for group data sharing in cloud storage
Chikezie et al. Mitigating Malicious Software Threat in Cloud Computing Models Using-Multi-Factor-Authentication-in-Cloud-Computing
Bolannavar Privacy-Preserving Public Auditing using TPA for Secure Cloud Storage
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载