Movatterモバイル変換


[0]ホーム

URL:


Balamurugan et al., 2014 - Google Patents

Common cloud architecture for cloud interoperability

Balamurugan et al., 2014

Document ID
367525003210599496
Author
Balamurugan B
Kumar N
Lakshmi G
Shanmuga R
Publication year
Publication venue
Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies

External Links

Snippet

Cloud computing is assert for communication connected through internet, along with the essentials for data storage and manipulation of it through various ways using customized cloud service providers. The Inter-Cloud heterogeneous communication provides a platform …
Continue reading atdl.acm.org (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Similar Documents

PublicationPublication DateTitle
KR102247658B1 (en) Processing of blockchain data based on smart contract behavior executed in a trusted execution environment
Hu et al.An access control scheme for big data processing
SharmaEvolution of as-a-Service Era in Cloud
Li et al.A survey of secure computation using trusted execution environments
AU2018391625A1 (en)Re-encrypting data on a hash chain
Xue et al.Security protection of system sharing data with improved CP-ABE encryption algorithm under cloud computing environment
Geng et al.Did-efed: Facilitating federated learning as a service with decentralized identities
Dewang et al.Data secure application: An application that allows developers to store user data securely using blockchain and IPFS
Anilkumar et al.A novel predicate based access control scheme for cloud environment using open stack swift storage
Sharma et al.MapSafe: A complete tool for achieving geospatial data sovereignty
Chen et al.One-time, oblivious, and unlinkable query processing over encrypted data on cloud
Kaci et al.Toward a big data approach for indexing encrypted data in cloud computing
Li et al.Cloudshare: towards a cost-efficient and privacy-preserving alliance cloud using permissioned blockchains
Balamurugan et al.Common cloud architecture for cloud interoperability
US11824896B2 (en)Cross-service rulebook management in a dynamic and adversarial environment
Al-Sabri et al.Building a cloud storage encryption (cse) architecture for enhancing cloud security
Sudhakar et al.Effective convolution method for privacy preserving in cloud over big data using map reduce framework
Guo et al.Secure data sharing technology of medical privacy data in the Web 3.0
Li et al.Blockchain-Based Searchable Encryption Access Control Mechanism for the Internet of Things
Zhang et al.Research of ABAC mechanism based on the improved encryption algorithm under cloud environment
Bai et al.Access control for cloud‐based eHealth social networking: design and evaluation
Chaoui et al.Comprehensive data life cycle security in cloud computing: current mastery and major challenges
Zhang et al.Blockchain-Assisted Keyword Search Scheme for SWIM Service Based on Improved CSC-Cuckoo Filter
To et al.Trustedmr: A trusted mapreduce system based on tamper resistance hardware
Gupta et al.Hybrid Multi-User Based Cloud Data Security for Medical Decision Learning Patterns

[8]
ページ先頭

©2009-2025 Movatter.jp