Velmurugan et al., 2024 - Google Patents
Provably secure data selective sharing scheme with cloud-based decentralized trust management systemsVelmurugan et al., 2024
View HTML- Document ID
- 18288658462443410924
- Author
- Velmurugan S
- Prakash M
- Neelakandan S
- Radhakrishnan A
- Publication year
- Publication venue
- Journal of Cloud Computing
External Links
Snippet
The smart collection and sharing of data is an important part of cloud-based systems, since huge amounts of data are being created all the time. This feature allows users to distribute data to particular recipients, while also allowing data proprietors to selectively grant access …
- 238000007726 management method 0 abstract description 33
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mohsin et al. | Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions | |
| Sajid et al. | Data privacy in cloud-assisted healthcare systems: state of the art and future challenges | |
| US20210218720A1 (en) | Systems and methods for secure custodial service | |
| EP2396921B1 (en) | Trusted cloud computing and services framework | |
| Kaur et al. | Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS | |
| US9165154B2 (en) | Trusted cloud computing and services framework | |
| Shen et al. | Blockchain for transparent data management toward 6G | |
| Majumder et al. | Taxonomy and classification of access control models for cloud environments | |
| Ghorbel et al. | Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain | |
| Verma et al. | Secure document sharing model based on blockchain technology and attribute-based encryption | |
| Neela et al. | An improved RSA technique with efficient data integrity verification for outsourcing database in cloud | |
| Velmurugan et al. | Provably secure data selective sharing scheme with cloud-based decentralized trust management systems | |
| Rashid et al. | RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations | |
| Malomo et al. | Security through block vault in a blockchain enabled federated cloud framework | |
| Wijesekara | A literature review on access control in networking employing blockchain | |
| Thilagavathy et al. | A novel framework paradigm for EMR management cloud system authentication using blockchain security network | |
| Antony Saviour et al. | IPFS based file storage access control and authentication model for secure data transfer using block chain technique | |
| Alansari | A blockchain-based approach for secure, transparent and accountable personal data sharing | |
| Ghanmi et al. | Blockchain‐cloud integration: comprehensive survey and open research issues | |
| Sabiri et al. | A systematic review of privacy-preserving blockchain applications in healthcare | |
| Tawfik et al. | ACHealthChain blockchain framework for access control and privacy preservation in healthcare | |
| Mounnan et al. | Decentralized access control infrastructure using blockchain for big data | |
| Raj et al. | A blockchain based lightweight and secure access control framework for IoT-enabled supply chain | |
| Garcia et al. | A Survey of Blockchain-Based Privacy Applications: An Analysis of Consent Management and Self-Sovereign Identity Approaches | |
| Tawfik et al. | Blockchain-based access control and privacy preservation in healthcare: a comprehensive survey |