Rafi et al., 2023 - Google Patents
Deep Learning for Encryption-Decryption Techniques for Cloud Data ConfidentialityRafi et al., 2023
View PDF- Document ID
- 5562884058819406705
- Author
- Rafi S
- Pvenkatasubramanyam Y
- Swathi A
- Publication year
External Links
Snippet
Cloud computing is one of the fastest growing internet-based technology that facilitates users to utilize services by making use of a large poll of resources without the installation of any software. Adoption of this technology is increasing rapidly because of many advantages …
- 238000000034 method 0 title abstract description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN102318262B (en) | Trusted cloud computing and services framework | |
| US9070112B2 (en) | Method and system for securing documents on a remote shared storage resource | |
| EP2396922B1 (en) | Trusted cloud computing and services framework | |
| Soofi et al. | A review on data security in cloud computing | |
| Chennam et al. | Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloud | |
| Swetha et al. | Security on mobile cloud computing using cipher text policy and attribute based encryption scheme | |
| Kumar et al. | Securing cloud access with enhanced attribute-based cryptography | |
| Rafi et al. | Deep Learning for Encryption-Decryption Techniques for Cloud Data Confidentiality | |
| CN113609077A (en) | File retrieval method, system, storage medium and equipment | |
| Wadhwa et al. | Framework for user authenticity and access control security over a cloud | |
| Chaudhari | Survey on securing IoT data using homomorphic encryption scheme | |
| Chennam et al. | Cloud security in crypt database server using fine grained access control | |
| Belose et al. | Data security using Armstrong numbers | |
| Shanthi et al. | Efficient secure system of data in cloud using steganography based cryptosystem with FSN | |
| Guo et al. | Designated server-aided revocable identity-based keyword search on lattice | |
| Satheesh et al. | A NOVEL HARDWARE PARAMETERS BASED CLOUD DATA ENCRYPTION AND DECRYPTION AGAINST UN-AUTHORIZED USERS | |
| Senthilkumar et al. | HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud | |
| Mohan et al. | Fine grained access control and revocation for secure cloud environment–a polynomial based approach | |
| Gonthireddy et al. | Secure Big Data Deduplication with Dynamic Ownership Management in Cloud Computing | |
| Neela et al. | A Hybrid Cryptography Technique with Blockchain for Data Integrity and Confidentiality in Cloud Computing | |
| Lavanya et al. | Anonymous data sharing scheme for dynamic groups in an untrusted cloud | |
| Take et al. | E-certificate generation using blockchain for p2p network: An overview | |
| Tekriwala et al. | Hierarchical Key-Aggregate Cryptosystem with Homomorphism for Scalable Data Sharing in Cloud Environments | |
| Tekriwala¹ et al. | Hierarchical Key-Aggregate Cryptosystem with Homomorphism for Scalable Data Sharing | |
| Soundappan et al. | Cloud Data Security Using Hybrid Encryption with Blockchain |