Nalini et al., 2016 - Google Patents

MLA scheme: Multi-level authentication for data in cloud using NTP-server and biometric

Nalini et al., 2016

Document ID
2373494206201571063
Author
Nalini S
Andrews J
Publication year
Publication venue
2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)

External Links

Snippet

Cloud computing models are built over huge number of self-managed systems. Data owner, User and the Cloud service provider are the basic entities of those models and forms a crypto-cloud. Communication that happens between the entities leads to various security …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material

Similar Documents

Publication Publication Date Title
CN108235805B (en) Account unifying method and device and storage medium
US11297064B2 (en) Blockchain authentication via hard/soft token verification
US11329981B2 (en) Issuing, storing and verifying a rich credential
US10516527B1 (en) Split-key based cryptography system for data protection and synchronization across multiple computing devices
Ibrokhimov et al. Multi-factor authentication in cyber physical system: A state of art survey
US10469253B2 (en) Methods and apparatus for migrating keys
CN109728903B (en) Block chain weak center password authorization method using attribute password
JP6040313B2 (en) Multi-party secure authentication system, authentication server, multi-party secure authentication method and program
US11700125B2 (en) zkMFA: zero-knowledge based multi-factor authentication system
Al-Assam et al. Automated biometric authentication with cloud computing
Sain et al. A survey on the security in cyber physical system with multi-factor authentication
Odelu IMBUA: identity management on blockchain for biometrics-based user authentication
Khan et al. A brief review on cloud computing authentication frameworks
Bharill et al. A secure key for cloud using threshold cryptography in Kerberos
US20230237146A1 (en) Facilitating generation of credentials and verification thereof within a distributed object storage system
Salvakkam et al. Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment
US20240121098A1 (en) Scalable Authentication System with Synthesized Signed Challenge
Nalini et al. MLA scheme: Multi-level authentication for data in cloud using NTP-server and biometric
Velliangiri et al. Trust factor based key distribution protocol in hybrid cloud environment
CN116112242B (en) Unified safety authentication method and system for power regulation and control system
Rong et al. A secure data access mechanism for cloud tenants
EP4315744A1 (en) Method and apparatus for providing and using a virtual representation of a user
Esiner et al. Layered security for storage at the edge: On decentralized multi-factor access control
Park Secure chip based encrypted search protocol in mobile office environments
Nguyen et al. Protecting biometrics using fuzzy extractor and non-invertible transformation methods in kerberos authentication protocol