[go: up one dir, main page]

Corena et al., 2014 - Google Patents

Data Storage on the Cloud under User Control

Corena et al., 2014

Document ID
5376076301898820477
Author
Corena J
Basu A
Nakano Y
Kiyomoto S
Miyake Y
Publication year
Publication venue
2014 IEEE 6th International Conference on Cloud Computing Technology and Science

External Links

Snippet

Cloud services provide advantages in terms of service scalability and availability of users' data, but increase concerns about the control that a user has over her own data. These concerns include not just issues related to access to the information itself, but issues about …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
    • H04L67/1042Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving topology management mechanisms
    • H04L67/1044Group management mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/40Services or applications
    • H04L65/4007Services involving a main real-time session and one or more additional parallel sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/30Network-specific arrangements or communication protocols supporting networked applications involving profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/24Presence management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network

Similar Documents

Publication Publication Date Title
CN112543187B (en) Industrial Internet of things safety data sharing method based on edge block chain
Hota et al. Capability-based cryptographic data access control in cloud computing
US20130254537A1 (en) Systems and methods for secure third-party data storage
EP4208808A1 (en) Privacy preserving machine learning using secure multi-party computation
Sugumar An effective encryption algorithm for multi-keyword-based top-K retrieval on cloud data
Neela et al. Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment
WO2018165835A1 (en) Cloud ciphertext access control method and system
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
Qiqieh et al. DNA cryptography based security framework for health-cloud data
Jammula et al. Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system
CN113518992A (en) Prevent data manipulation with multiple aggregation servers
CN118921161A (en) Data security gateway method and system based on edge privacy calculation
CN106888213B (en) Cloud ciphertext access control method and system
Rawal Proxy re-encryption architect for storing and sharing of cloud contents
Li et al. Cloudshare: towards a cost-efficient and privacy-preserving alliance cloud using permissioned blockchains
Kanimozhi et al. Secure sharing of IOT data in cloud environment using attribute-based encryption
Arvind et al. Secure data classification using superior naive classifier in agent based mobile cloud computing
Srisakthi et al. Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment
Sammeta et al. Blockchain-based scalable and secure EHR data sharing using proxy re-encryption.
Zhang et al. Secure deduplication based on Rabin fingerprinting over wireless sensing data in cloud computing
Corena et al. Data Storage on the Cloud under User Control
Srisakthi et al. Pcsp: A protected cloud storage provider employing light weight techniques
Xie et al. Assured Deletion: A Scheme Based on Strong Nonseparability
Salem et al. An efficient privacy preserving public auditing mechanism for secure cloud storage
Elumalai et al. Secure and efficient data storage with Rivest Shamir Adleman algorithm in cloud environment