Kumar et al., 2016 - Google Patents
A survey on secure cloud: security and privacy in cloud computingKumar et al., 2016
View PDF- Document ID
- 13643409135230987254
- Author
- Kumar S
- Vajpayee A
- Publication year
- Publication venue
- American Journal of Systems and Software
External Links
Snippet
Cloud computing is an emerging technology that is still unclear to many security problems. The security problem becomes amplified under the cloud model as new dimensions enter into the problem scope related to the architecture, multi-tenancy, layer dependency, and …
- 238000005516 engineering process 0 abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kumar et al. | A survey on secure cloud: security and privacy in cloud computing | |
| Ranchal et al. | Protection of identity information in cloud computing without trusted third party | |
| Jakimoski | Security techniques for data protection in cloud computing | |
| Modi et al. | A survey on security issues and solutions at different layers of Cloud computing | |
| Sumitra et al. | A survey of cloud authentication attacks and solution approaches | |
| EP3479542A1 (en) | Detecting attacks using compromised credentials via internal network monitoring | |
| Kiraz | A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing | |
| Sridhar et al. | A survey on cloud security issues and challenges with possible measures | |
| US20240012933A1 (en) | Integration of identity access management infrastructure with zero-knowledge services | |
| Shajan et al. | Survey of security threats and countermeasures in cloud computing | |
| Panth et al. | A survey on security mechanisms of leading cloud service providers | |
| Gupta et al. | Cloud computing: Security threats & control strategy using tri-mechanism | |
| Sehgal et al. | Cloud computing and information security | |
| Chinedu et al. | Security of cloud virtualized resource on a SaaS encryption solution | |
| Abubakar | Improving cloud data security by hybridization of zero-knowledge proof and time-based one-time password | |
| Albaroodi et al. | A proposed framework for outsourcing and secure encrypted data on OpenStack object storage (Swift) | |
| Soni et al. | Security and privacy in cloud computing | |
| Brooks et al. | Conceptualizing a secure wireless cloud | |
| Jang-Jaccard et al. | Portable key management service for cloud storage | |
| Darwish et al. | Privacy and security of cloud computing: a comprehensive review of techniques and challenges | |
| Zkik et al. | A New Authentication and Homomorphic Encryption as a Service Model for Preserving Privacy in Clouds. | |
| Dahiya et al. | IMPLEMENTING MULTILEVEL DATA SECURITY IN CLOUD COMPUTING. | |
| Kuzminykh et al. | Mechanisms of ensuring security in Keystone service | |
| ALnwihel et al. | A Novel Cloud Authentication Framework | |
| Waizenegger | Data security in multi-tenant environments in the cloud |