Corena et al., 2014 - Google Patents
Data Storage on the Cloud under User ControlCorena et al., 2014
- Document ID
- 5376076301898820477
- Author
- Corena J
- Basu A
- Nakano Y
- Kiyomoto S
- Miyake Y
- Publication year
- Publication venue
- 2014 IEEE 6th International Conference on Cloud Computing Technology and Science
External Links
Snippet
Cloud services provide advantages in terms of service scalability and availability of users' data, but increase concerns about the control that a user has over her own data. These concerns include not just issues related to access to the information itself, but issues about …
- 238000010276 construction 0 abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1042—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving topology management mechanisms
- H04L67/1044—Group management mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/40—Services or applications
- H04L65/4007—Services involving a main real-time session and one or more additional parallel sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN112543187B (en) | Industrial Internet of things safety data sharing method based on edge block chain | |
| Hota et al. | Capability-based cryptographic data access control in cloud computing | |
| US20130254537A1 (en) | Systems and methods for secure third-party data storage | |
| EP4208808A1 (en) | Privacy preserving machine learning using secure multi-party computation | |
| Sugumar | An effective encryption algorithm for multi-keyword-based top-K retrieval on cloud data | |
| Neela et al. | Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment | |
| WO2018165835A1 (en) | Cloud ciphertext access control method and system | |
| CN104967693A (en) | Document similarity calculation method facing cloud storage based on fully homomorphic password technology | |
| Qiqieh et al. | DNA cryptography based security framework for health-cloud data | |
| Jammula et al. | Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system | |
| CN113518992A (en) | Prevent data manipulation with multiple aggregation servers | |
| CN118921161A (en) | Data security gateway method and system based on edge privacy calculation | |
| CN106888213B (en) | Cloud ciphertext access control method and system | |
| Rawal | Proxy re-encryption architect for storing and sharing of cloud contents | |
| Li et al. | Cloudshare: towards a cost-efficient and privacy-preserving alliance cloud using permissioned blockchains | |
| Kanimozhi et al. | Secure sharing of IOT data in cloud environment using attribute-based encryption | |
| Arvind et al. | Secure data classification using superior naive classifier in agent based mobile cloud computing | |
| Srisakthi et al. | Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment | |
| Sammeta et al. | Blockchain-based scalable and secure EHR data sharing using proxy re-encryption. | |
| Zhang et al. | Secure deduplication based on Rabin fingerprinting over wireless sensing data in cloud computing | |
| Corena et al. | Data Storage on the Cloud under User Control | |
| Srisakthi et al. | Pcsp: A protected cloud storage provider employing light weight techniques | |
| Xie et al. | Assured Deletion: A Scheme Based on Strong Nonseparability | |
| Salem et al. | An efficient privacy preserving public auditing mechanism for secure cloud storage | |
| Elumalai et al. | Secure and efficient data storage with Rivest Shamir Adleman algorithm in cloud environment |