Hammoudeh et al., 2023 - Google Patents
Empowering Security in Cloud Environment Using Encryption TechniqueHammoudeh et al., 2023
View PDF- Document ID
- 4059203177175079168
- Author
- Hammoudeh M
- Flah A
- Al Nassar N
- Al Rajhi W
- Ibrahim R
- Publication year
- Publication venue
- International Conference on Innovation of Emerging Information and Communication Technology
External Links
Snippet
Abstract In Saudi Vision 2030 policy, the Saudi government has placed a high value on technical advancement. Therefore, due to Vision 2030 by Saudi Arabia's government that aims at diversifying its economy and creating more jobs in the country, the importance of the …
- 238000000034 method 0 title abstract description 43
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9209972B2 (en) | Mediator device monitoring and controlling access to electronic content | |
| Ghanmi et al. | A secure data storage in multi-cloud architecture using blowfish encryption algorithm | |
| Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
| Gangadharaiah et al. | Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain | |
| US12081532B1 (en) | Systems and methods for facilitating a double-layer restriction subnet architecture using subnet specific restrictions within data streamed using hierarchical subnet restrictions | |
| Sinchana et al. | Survey on cloud computing security | |
| Vrana | Cyber security and data ownership | |
| Bhowmik et al. | Linear feedback shift register and integer theory: a state-of-art approach in security issues over e-commerce | |
| US20140208108A1 (en) | Mediator utilizing electronic content to enforce policies to a resource | |
| Mondal et al. | A systematic literature survey on data security techniques in a cloud environment | |
| Fernandez et al. | Securing blockchain with quantum safe cryptography: When and how? | |
| Imteaj et al. | Introduction to Blockchain technology | |
| Purushothama et al. | Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud | |
| Sunil Kumar et al. | A Data Privacy Approach Using Shamir’s Secret Scheme in Permissioned Blockchain | |
| Hammoudeh et al. | Empowering Security in Cloud Environment Using Encryption Technique | |
| Ahmed et al. | Enhancing e-KYC Security and Privacy: Harnessing Quantum Computing and Blockchain in Web 3.0 | |
| US9092780B2 (en) | User-mediator monitoring and controlling access to electronic content | |
| Srisakthi et al. | Pcsp: A protected cloud storage provider employing light weight techniques | |
| Mallick et al. | Security aspects of social media applications | |
| Pasumarthy et al. | TIPS: Threat Sharing Information Platform for Enhanced Security | |
| Zhou et al. | Towards blockchain-based auditing of data exchanges | |
| US20140297333A1 (en) | User-mediator mediating transfer of electronic content | |
| Sherin Beevi et al. | Blockchain Based Email Communication with SHA-256 Algorithm | |
| Siopi et al. | DeCStor: A Framework for Privately and Securely Sharing Files Using a Public Blockchain | |
| Soundappan et al. | Cloud Data Security Using Hybrid Encryption with Blockchain |