[go: up one dir, main page]

Rafi et al., 2023 - Google Patents

Deep Learning for Encryption-Decryption Techniques for Cloud Data Confidentiality

Rafi et al., 2023

View PDF
Document ID
5562884058819406705
Author
Rafi S
Pvenkatasubramanyam Y
Swathi A
Publication year

External Links

Snippet

Cloud computing is one of the fastest growing internet-based technology that facilitates users to utilize services by making use of a large poll of resources without the installation of any software. Adoption of this technology is increasing rapidly because of many advantages …
Continue reading at ijte.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor

Similar Documents

Publication Publication Date Title
CN102318262B (en) Trusted cloud computing and services framework
US9070112B2 (en) Method and system for securing documents on a remote shared storage resource
EP2396922B1 (en) Trusted cloud computing and services framework
Soofi et al. A review on data security in cloud computing
Chennam et al. Performance analysis of various encryption algorithms for usage in multistage encryption for securing data in cloud
Swetha et al. Security on mobile cloud computing using cipher text policy and attribute based encryption scheme
Kumar et al. Securing cloud access with enhanced attribute-based cryptography
Rafi et al. Deep Learning for Encryption-Decryption Techniques for Cloud Data Confidentiality
CN113609077A (en) File retrieval method, system, storage medium and equipment
Wadhwa et al. Framework for user authenticity and access control security over a cloud
Chaudhari Survey on securing IoT data using homomorphic encryption scheme
Chennam et al. Cloud security in crypt database server using fine grained access control
Belose et al. Data security using Armstrong numbers
Shanthi et al. Efficient secure system of data in cloud using steganography based cryptosystem with FSN
Guo et al. Designated server-aided revocable identity-based keyword search on lattice
Satheesh et al. A NOVEL HARDWARE PARAMETERS BASED CLOUD DATA ENCRYPTION AND DECRYPTION AGAINST UN-AUTHORIZED USERS
Senthilkumar et al. HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud
Mohan et al. Fine grained access control and revocation for secure cloud environment–a polynomial based approach
Gonthireddy et al. Secure Big Data Deduplication with Dynamic Ownership Management in Cloud Computing
Neela et al. A Hybrid Cryptography Technique with Blockchain for Data Integrity and Confidentiality in Cloud Computing
Lavanya et al. Anonymous data sharing scheme for dynamic groups in an untrusted cloud
Take et al. E-certificate generation using blockchain for p2p network: An overview
Tekriwala et al. Hierarchical Key-Aggregate Cryptosystem with Homomorphism for Scalable Data Sharing in Cloud Environments
Tekriwala¹ et al. Hierarchical Key-Aggregate Cryptosystem with Homomorphism for Scalable Data Sharing
Soundappan et al. Cloud Data Security Using Hybrid Encryption with Blockchain