Nalini et al., 2016 - Google Patents
MLA scheme: Multi-level authentication for data in cloud using NTP-server and biometricNalini et al., 2016
- Document ID
- 2373494206201571063
- Author
- Nalini S
- Andrews J
- Publication year
- Publication venue
- 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
External Links
Snippet
Cloud computing models are built over huge number of self-managed systems. Data owner, User and the Cloud service provider are the basic entities of those models and forms a crypto-cloud. Communication that happens between the entities leads to various security …
- 201000001997 microphthalmia with limb anomalies 0 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108235805B (en) | Account unifying method and device and storage medium | |
US11297064B2 (en) | Blockchain authentication via hard/soft token verification | |
US11329981B2 (en) | Issuing, storing and verifying a rich credential | |
US10516527B1 (en) | Split-key based cryptography system for data protection and synchronization across multiple computing devices | |
Ibrokhimov et al. | Multi-factor authentication in cyber physical system: A state of art survey | |
US10469253B2 (en) | Methods and apparatus for migrating keys | |
CN109728903B (en) | Block chain weak center password authorization method using attribute password | |
JP6040313B2 (en) | Multi-party secure authentication system, authentication server, multi-party secure authentication method and program | |
US11700125B2 (en) | zkMFA: zero-knowledge based multi-factor authentication system | |
Al-Assam et al. | Automated biometric authentication with cloud computing | |
Sain et al. | A survey on the security in cyber physical system with multi-factor authentication | |
Odelu | IMBUA: identity management on blockchain for biometrics-based user authentication | |
Khan et al. | A brief review on cloud computing authentication frameworks | |
Bharill et al. | A secure key for cloud using threshold cryptography in Kerberos | |
US20230237146A1 (en) | Facilitating generation of credentials and verification thereof within a distributed object storage system | |
Salvakkam et al. | Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment | |
US20240121098A1 (en) | Scalable Authentication System with Synthesized Signed Challenge | |
Nalini et al. | MLA scheme: Multi-level authentication for data in cloud using NTP-server and biometric | |
Velliangiri et al. | Trust factor based key distribution protocol in hybrid cloud environment | |
CN116112242B (en) | Unified safety authentication method and system for power regulation and control system | |
Rong et al. | A secure data access mechanism for cloud tenants | |
EP4315744A1 (en) | Method and apparatus for providing and using a virtual representation of a user | |
Esiner et al. | Layered security for storage at the edge: On decentralized multi-factor access control | |
Park | Secure chip based encrypted search protocol in mobile office environments | |
Nguyen et al. | Protecting biometrics using fuzzy extractor and non-invertible transformation methods in kerberos authentication protocol |