Ranganath, 2021 - Google Patents

Cloud Data Security through Hybrid Verification Technique Based on Cryptographic Hash Function

Ranganath, 2021

View PDF
Document ID
13691769722328128760
Author
Ranganath V
Publication year

External Links

Snippet

Encrypted communications have a long history of use. Today, however, we can protect information confidentiality and privacy, which is critical to contemporary encryption research. Encrypted data is also used in research initiatives including human behaviour, financial …
Continue reading at norma.ncirl.ie (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
US11811936B2 (en) Public/private key biometric authentication system
US11824991B2 (en) Securing transactions with a blockchain network
US11245532B2 (en) Authentication method for a client over a network
TWI578749B (en) Methods and apparatus for migrating keys
KR101658501B1 (en) Digital signature service system based on hash function and method thereof
US20170078091A1 (en) One-Time Passcodes with Asymmetric Keys
JP2012044670A (en) User authentication method based on utilization of biometric identification techniques, and related architecture
US20130088327A1 (en) Template delivery type cancelable biometric authentication system and method therefor
US9280650B2 (en) Authenticate a fingerprint image
CN111541713A (en) Identity authentication method and device based on block chain and user signature
AU2018100503A4 (en) Split data/split storage
Al-Assam et al. Automated biometric authentication with cloud computing
Griffin Telebiometric authentication objects
US20080250245A1 (en) Biometric-based document security
Khan et al. A brief review on cloud computing authentication frameworks
US20240364526A1 (en) Methods and systems for generating and validating uses of digital credentials and other documents
US11868457B2 (en) Device and method for authenticating user and obtaining user signature using user's biometrics
US20240121098A1 (en) Scalable Authentication System with Synthesized Signed Challenge
Khalid et al. Cloud server security using bio-cryptography
Patel et al. The study of digital signature authentication process
Ranganath Cloud Data Security through Hybrid Verification Technique Based on Cryptographic Hash Function
Zhang et al. BioP-TAP: An efficient method of template protection and two-factor authentication protocol combining biometric and PUF
US20240169350A1 (en) Securing transactions with a blockchain network
Narayanankutty et al. Novel authentication system for personal and domestic network systems using image feature comparison and digital signatures
PRIYA et al. TRUSTED HYBRID MULTIFACTOR AUTHENTICATION FOR CLOUD USERS.