[go: up one dir, main page]

Kumar et al., 2016 - Google Patents

A survey on secure cloud: security and privacy in cloud computing

Kumar et al., 2016

View PDF
Document ID
13643409135230987254
Author
Kumar S
Vajpayee A
Publication year
Publication venue
American Journal of Systems and Software

External Links

Snippet

Cloud computing is an emerging technology that is still unclear to many security problems. The security problem becomes amplified under the cloud model as new dimensions enter into the problem scope related to the architecture, multi-tenancy, layer dependency, and …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Similar Documents

Publication Publication Date Title
Kumar et al. A survey on secure cloud: security and privacy in cloud computing
Ranchal et al. Protection of identity information in cloud computing without trusted third party
Jakimoski Security techniques for data protection in cloud computing
Modi et al. A survey on security issues and solutions at different layers of Cloud computing
Sumitra et al. A survey of cloud authentication attacks and solution approaches
EP3479542A1 (en) Detecting attacks using compromised credentials via internal network monitoring
Kiraz A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
Sridhar et al. A survey on cloud security issues and challenges with possible measures
US20240012933A1 (en) Integration of identity access management infrastructure with zero-knowledge services
Shajan et al. Survey of security threats and countermeasures in cloud computing
Panth et al. A survey on security mechanisms of leading cloud service providers
Gupta et al. Cloud computing: Security threats & control strategy using tri-mechanism
Sehgal et al. Cloud computing and information security
Chinedu et al. Security of cloud virtualized resource on a SaaS encryption solution
Abubakar Improving cloud data security by hybridization of zero-knowledge proof and time-based one-time password
Albaroodi et al. A proposed framework for outsourcing and secure encrypted data on OpenStack object storage (Swift)
Soni et al. Security and privacy in cloud computing
Brooks et al. Conceptualizing a secure wireless cloud
Jang-Jaccard et al. Portable key management service for cloud storage
Darwish et al. Privacy and security of cloud computing: a comprehensive review of techniques and challenges
Zkik et al. A New Authentication and Homomorphic Encryption as a Service Model for Preserving Privacy in Clouds.
Dahiya et al. IMPLEMENTING MULTILEVEL DATA SECURITY IN CLOUD COMPUTING.
Kuzminykh et al. Mechanisms of ensuring security in Keystone service
ALnwihel et al. A Novel Cloud Authentication Framework
Waizenegger Data security in multi-tenant environments in the cloud