Yan et al., 2017 - Google Patents
Heterogeneous data storage management with deduplication in cloud computingYan et al., 2017
View PDF- Document ID
- 6955495699068932884
- Author
- Yan Z
- Zhang L
- Wenxiu D
- Zheng Q
- Publication year
- Publication venue
- IEEE Transactions on Big Data
External Links
Snippet
Cloud storage as one of the most important services of cloud computing helps cloud users break the bottleneck of restricted resources and expand their storage without upgrading their devices. In order to guarantee the security and privacy of cloud users, data are always …
- 238000004458 analytical method 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yan et al. | Heterogeneous data storage management with deduplication in cloud computing | |
Yan et al. | Deduplication on encrypted big data in cloud | |
Tang et al. | Secure overlay cloud storage with access control and assured deletion | |
Premkamal et al. | Enhanced attribute based access control with secure deduplication for big data storage in cloud | |
US20150067330A1 (en) | Method and system for network data access | |
Horng et al. | An identity-based and revocable data-sharing scheme in VANETs | |
Yan et al. | A scheme to manage encrypted data storage with deduplication in cloud | |
Tu et al. | A secure, efficient and verifiable multimedia data sharing scheme in fog networking system | |
Bacis et al. | Access control management for secure cloud storage | |
Wise et al. | Cloud docs: secure scalable document sharing on public clouds | |
WO2023226308A1 (en) | File sharing methods, file sharing system, electronic device and readable storage medium | |
Ding et al. | Secure encrypted data deduplication with ownership proof and user revocation | |
Chandar et al. | Hierarchical attribute based proxy re-encryption access control in cloud computing | |
Swetha et al. | Security on mobile cloud computing using cipher text policy and attribute based encryption scheme | |
Liu et al. | A secure and efficient data sharing framework with delegated capabilities in hybrid cloud | |
Yan et al. | Encrypted big data deduplication in cloud storage | |
Silambarasan et al. | Attribute-based convergent encryption key management for secure deduplication in cloud | |
Salim et al. | An efficient public auditing scheme for cloud storage with secure access control and resistance against DOS attack by iniquitous TPA | |
Katre et al. | Trusted third party for data security in cloud environment | |
Gupta et al. | Secure Group Data Sharing with an Efficient Key Management without Re-Encryption Scheme in Cloud Computing | |
Divya et al. | A combined data storage with encryption and keyword based data retrieval using SCDS-TM model in cloud | |
Gonthireddy et al. | Secure Big Data Deduplication with Dynamic Ownership Management in Cloud Computing | |
Mahmoud et al. | A robust cryptographic‐based system for secure data sharing in cloud environments | |
Patil et al. | Survey Paper On Modoc: Multi Owner Data Sharing Over Cloud | |
Varalakshmi et al. | A framework for secure cryptographic key management systems |