Vignesh et al., 2023 - Google Patents
Secured Data Access and Control Abilities Management over Cloud Environment using Novel Cryptographic PrinciplesVignesh et al., 2023
- Document ID
- 3633898242025720215
- Author
- Vignesh R
- Chinnammal V
- Kumar A
- Karthikeyan K
- Arunkumar J
- et al.
- Publication year
- Publication venue
- 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)
External Links
Snippet
In a digital world, each and every individual or organization required to store their data in the digital form over a secured environment. The main problem with that is the maintenance cost and the security, in which the public clouds allow the users to maintain the records in a safe …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kaaniche et al. | A blockchain-based data usage auditing architecture with enhanced privacy and availability | |
| Murala et al. | Secure dynamic groups data sharing with modified revocable attribute-based encryption in cloud | |
| CN105122265B (en) | Data safety service system | |
| Majumder et al. | Taxonomy and classification of access control models for cloud environments | |
| CN103220141B (en) | A kind of protecting sensitive data method and system based on group key strategy | |
| EP3395004B1 (en) | A method for encrypting data and a method for decrypting data | |
| Vignesh et al. | Secured Data Access and Control Abilities Management over Cloud Environment using Novel Cryptographic Principles | |
| Jakóbik | Big data security | |
| Guo et al. | Using blockchain to control access to cloud data | |
| CN116805078A (en) | A data intelligent management system and method for logistics information platform based on big data | |
| Arulananth et al. | Multi party secure data access management in cloud using user centric block chain data encryption | |
| Velmurugan et al. | Provably secure data selective sharing scheme with cloud-based decentralized trust management systems | |
| Suthar et al. | EncryScation: A novel framework for cloud iaas, daas security using encryption and obfuscation techniques | |
| Sankari et al. | Dynamic access control through cryptography in cloud | |
| Shivanna et al. | Privacy preservation in cloud computing with double encryption method | |
| Joshi et al. | Navigating the Complexities of Cryptography: Trends, Problems, and Solutions | |
| Agarwal et al. | A safe and resilient cryptographic system for dynamic cloud groups with secure data sharing and efficient user revocation | |
| Sawle et al. | Survey on data classification and data encryption techniques used in cloud computing | |
| Saraswathi et al. | A Secured Storage using AES Algorithm and Role Based Access in Cloud | |
| Senthilkumar et al. | HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud | |
| Naik et al. | A Research on Various Security Aware Mechanisms in Multi-Cloud Environment for Improving Data Security | |
| Alatab et al. | Privacy Protected Preservation of Electric Vehicles’ Data in Cloud Computing Using Secure Data Access Control. Energies 2022, 15, 8085. htps | |
| Mounnan et al. | Efficient distributed access control using blockchain for big data in clouds | |
| Raja et al. | An enhanced study on cloud data services using security technologies | |
| Mun et al. | Person-wise privacy level access control for personal information directory services |