AU2021106271A4 - A method for secured data sharing in an untrusted cloud storage - Google Patents

A method for secured data sharing in an untrusted cloud storage Download PDF

Info

Publication number
AU2021106271A4
AU2021106271A4 AU2021106271A AU2021106271A AU2021106271A4 AU 2021106271 A4 AU2021106271 A4 AU 2021106271A4 AU 2021106271 A AU2021106271 A AU 2021106271A AU 2021106271 A AU2021106271 A AU 2021106271A AU 2021106271 A4 AU2021106271 A4 AU 2021106271A4
Authority
AU
Australia
Prior art keywords
data
file
community
cloud
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021106271A
Inventor
Syed Thouheed Ahmed
Afroze Ansari
Masrath Begum
Mohammed Abdul Waheed
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to AU2021106271A priority Critical patent/AU2021106271A4/en
Application granted granted Critical
Publication of AU2021106271A4 publication Critical patent/AU2021106271A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The method for secured data sharing in an un trusted cloud storage comprises providing any user of a specific community with a public key for each group member as a password; allowing generation/deletion of data and addition/deletion of new customer data in a community impact the users without any external structures and tackling problem of revocation of users thoroughly with a highly safe, fine-grained access mechanism; employing an encryption method to promote protected information sharing on many servers which are not trusted ones; splitting complete file into file groups and encoding specific file block keys of each file section by the data owner; generating a significant file transfer overhead thereby changing and distributing the file block key to delete the costumer again; and offering a secure way to connect the data with active cloud customers and maximum degree of protection by issuing a special secret key to each person. 16 0N 0 0 0 N 30 4 S E --N 0. > ~ -2 .2 co 0 I -0 C.) m ) uc CU C 0 L - E cu -u 14- a) E 20 Lm 0 R) . E E -C 4 cu i- w0 CU cu t cu -c E ) CU -E -0 0C 0- 0 4-. 40$ c~n 0 M 0 EI ' L p CO W 0u >- $-. -0 tw .2E -Ne~ ~~ j -C Co ~ C ~ L m 0)~ u -00c a) 0 CU4 CU tw U - co 0 -i 0 4.C . 4 -- EL '' C 0 CC 0f $- -ET c ac -N 4511 0 1 a 00 CU >L W _0 (A4(Ln4 2 : 4-- 4U 0 u 0o o 00 . ,4 _: -u -C. 19 *9C- 0 Cu 0 -0 CU CU 0) CU _ U 4 _0 :E E L - C 4- U 0o 0 o C:A 0.C M )0 L- U0 ) L.0 > Cu CL >. 0)(A C CU2CUC 0 C a) CM 0 0 0) o 0) 2L C2 = 0 %. 0) 0)

Description

N 0 0 0 N
30 4
SE N --
co 0. 0 > ~ I -2.2 -0 C.) m ) uc CU C 0 L - E
cu -u 20 Lm 0 14- a) ER)
. E E -C 4
cu i- w0 CU cu t cu -c E
) CU -E 0C -0 0$ 0- 0 c~n 0 M 4-. 4
0 EI ' L p CO W 0u >- $-. -0 tw .2E -Ne~ ~~ j -C Co ~ C ~ L
m 0)~ u -00c a) 0 CU4 CU tw U - 0 co 0 -i 4.C.
4 -- EL C 0CC 0f $- -ET c '' ac -N 4511 0 1 a00 CU >L W _0 (A4(Ln4
2 : 4-- 4U 0 u 0o o 00
. ,4 _: -u -C. 19 *9C- 0 Cu 0 -0 CU CU 0) CU _ U 4 0 _0 :E E L - C 4- o U 0 o C:A 0.C
M )0L- U0 ) L.0 > Cu CL >. 0)(A C CU2CUC 0 C a) CM 0 0 0) o 0)
= 2L C2 0
%. 0) 0)
A METHOD FOR SECURED DATA SHARING IN AN UNTRUSTED CLOUD STORAGE
FIELDOFTHEINVENTION The present disclosure relates to a method for secured data sharing in an un trusted cloud storage.
BACKGROUND OF THE INVENTION Cloud computing is an emerging area which basically provides enormous services on the basis of pay as you go. Most commonly used service provided by cloud is data storage. Cloud services are the most cost effective and an efficient solution for utilizing resources among various cloud users. It is very difficult to set an efficient data sharing scheme for groups in cloud because cloud users are very reluctant to share their identity and at the same time all cloud users are expecting cloud to provide cost effective services.
The cloud storage facility can be used instead of saved online documents, images or videos, or even one can use a webmail or social networking platforms. If for a business, one chooses to use a web invoicing service for example, rather than upgrading the in-house or manual storage one used for several years, the online invoicing service might be a cloud storage service. Cloud infrastructure relates to the availability of network computing services. Instead of using a web enabled service to store information or to use the cloud instead of storing the data on own disc or upgrading apps for different purposes.
Cloud platforms allow individuals and organizations to utilize remote third-party applications and hardware. The cloud resources available include online storing of data, on-line business software, webmail and websites. The Cloud infrastructure paradigm enables access from everywhere a network link to knowledge and data services. A common pool of services is created by cloud infrastructure, including servers, networks, information processing and advanced corporate and costumer software.
Cloud hosting capabilities include self-service on-demand, wide network connectivity, pooling of resources and quick flexibility. Self service on demand ensures that costumers (usually companies) may order and handle their own machine services. Broad network connectivity allows for internet resources. Pooled services imply that clients draw from a computer pool, mostly in isolated data centres. Products can often be more or less scaled, and costumer use is calculated and appropriately billed.
In the view of the forgoing discussion, it is clearly portrayed that there is a need to have a method for secured data sharing in an un trusted cloud storage.
SUMMARY OF THE INVENTION
The present disclosure seeks to provide a method for secured data sharing in an un trusted cloud storage among various users in a group in a secured manner.
In an embodiment, a method for secured data sharing in an un trusted cloud storage is disclosed. The method includes providing any user of a specific community with a public key for each group member as a password. The method further includes allowing generation/deletion of data and addition/deletion of new customer data in a community impact the users without any external structures and tackling problem of revocation of users thoroughly with a highly safe, fine-grained access mechanism. The method further includes employing an encryption method to promote protected information sharing on many servers which are not trusted ones. The method further includes splitting complete file into file groups and encoding specific file block keys of each file section by the data owner. The method further includes generating a significant file transfer overhead thereby changing and distributing the file block key to delete the costumer again. The method further includes offering a secure way to connect the data with active cloud customers and maximum degree of protection by issuing a special secret key to each person.
In an embodiment, the users utilizes the specific file block keys to encode the different file keys.
In an embodiment, data are exchanged solely with the cloud members of the cloud community.
In an embodiment, the login and cancellation of eligible community participants allows, wherein any participant of the cloud is allowed to save and add data with the same community.
In an embodiment, users are deleted from a category if necessary and group manager is not allowed to change the other participants' keys.
In an embodiment, after sharing group signature with all group members, group members are able to start secure data sharing by uploading and downloading the files.
In an embodiment, the group member calculates and send value or generated key to the group Manager thereby calculating and sending final report to group member with encrypting data and finally generated key are used, which is further decrypt using secret key of group member.
An object of the present disclosure is to develop a secured data sharing method for dynamic cloud users.
Another object of the present disclosure is to share any information among various users in a group in a secured manner.
Yet another object of the present invention is to deliver an expeditious and cost-effective method for secured data sharing in an un trusted cloud storage.
To further clarify advantages and features of the present disclosure, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
BRIEFDESCRIPTIONOFFIGURES These and other features, aspects, and advantages of the present disclosure will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Figure lillustrates a flow chart of amethod for secured data sharing in an un trusted cloud storage in accordance with an embodiment of the present disclosure; Figure2illustrates a data flow diagram in accordance with an embodiment of the present disclosure; and Figure 3 illustrates a sequence diagramin accordance with an embodiment of the present disclosure.
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present disclosure. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
DETAILED DESCRIPTION For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as illustrated therein being contemplated as would normally occur to one skilled in the art to which the invention relates.
It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the invention and are not intended to be restrictive thereof.
Reference throughout this specification to "an aspect", "another aspect" or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or sub-systems or elements or structures or components proceeded by "comprises...a" does not, without more constraints, preclude the existence of other devices or other sub-systems or other elements or other structures or other components or additional devices or additional sub-systems or additional elements or additional structures or additional components.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
Embodiments of the present disclosure will be described below in detail with reference to the accompanying drawings.
Referring to Figure 1, a flow chart of amethod for secured data sharing in an un trusted cloud storage is illustrated in accordance with an embodiment of the present disclosure. At step 102, the method 100 includes providing any user of a specific community with a public key for each group member as a password.
At step 104, the method 100 includes allowing generation/deletion of data and addition/deletion of new customer data in a community impact the users without any external structures and tackling problem of revocation of users thoroughly with a highly safe, fine-grained access mechanism.
At step 106, the method 100 includes employing an encryption method to promote protected information sharing on many servers which are not trusted ones.
At step 108, the method 100 includes splitting complete file into file groups and encoding specific file block keys of each file section by the data owner.
At step 110, the method 100 includes generating a significant file transfer overhead thereby changing and distributing the file block key to delete the costumer again.
At step 112, the method 100 includes offering a secure way to connect the data with active cloud customers and maximum degree of protection by issuing a special secret key to each person.
In an embodiment, the users utilizes the specific file block keys to encode the different file keys.
In an embodiment, data are exchanged solely with the cloud members of the cloud community.
In an embodiment, the login and cancellation of eligible community participants allows, wherein any participant of the cloud is allowed to save and add data with the same community.
In an embodiment, users are deleted from a category if necessary and group manager is not allowed to change the other participants' keys.
In an embodiment, after sharing group signature with all group members, group members are able to start secure data sharing by uploading and downloading the files.
In an embodiment, the group member calculates and send value or generated key to the group Manager thereby calculating and sending final report to group member with encrypting data and finally generated key are used, which is further decrypt using secret key of group member.
Figure 2 illustrates a data flow diagram in accordance with an embodiment of the present disclosure.In cloud storage customers do not realize if their data can be processed in the same data center or dispersed via several other data centers. This can be achieved for virtual computers. There is a large probability of user knowledge present in the cloud owing to virtual processing technologies, which allows user details to be readily available from everywhere on the net. Much of the time it is challenging to distinguish authenticated user. This sensitivity to protection and insulation is the product of cloud storage services. The identification information of numerous services rendered by cloud users must be supplied by filling out personal data forms on the internet. This method involves the personal information to be protected until the intruder abuse it. Users have little data transparency and little power over them and this capability is missing in the cloud machine. Users should not realize if the details should be revealed in order to be mindful of the possibility of theft. The cloud service normally fixes this. However no cloud user is informed of the concerns posed for the processing of their results. Data security remains unknown to customers of cloud storage. If data security and privacy problems are considered, the provision of an appropriate remedy is a significant warning.
The data protection and safety of the user and of the cloud must be ensured and different standards vary amongst different customers. The vendors play a large part in confidentiality and privacy in the private cloud, but the cloud user plays a major role with the public cloud. In this scheme the data is protected with the customer's Community Signature and Data Encoding. Owing to this, unable to use the content in the cloud for developers and revoked users. The secrecy of the data is presumably preserved. The real knowledge of the customer is obscured to preserve the protection of identification. In the event of wrong doing and enabling only the approved users to access info, admin has been carrying on traceability and confidentiality to reveal identification.
By utilizing access control, each cloud user however must experience multiple phases, such as registration, verification, permission and accounting to access the information or services. The Role-based Access Control (RBA) approach is used in this definition to access cloud data. Where the cloud user can navigate the device based on the functions. The administrative authorities are responsible for assigning tasks to authorized users. These controls can be interpreted, written and erased. Any member of a community will access and carry out additional operations on files.
Securing data and the protection of identity when exchanging data between cloud users is a difficult problem, since the customer shifts in a community continuously. Here it proposes a secure data exchange system for participating groups inside the external supplier. This is enabled by new encryption strategies under which every user may exchange knowledge with others in a network.
At the similar moment, as the encryption rate and over head of storage of this process increases the revoked users become autonomous. The following attributes refer to this system:
* Any participant of the cloud will save and add data with those of the same community.
• Users can be deleted from a category if necessary. Group manager should not have to change the other participants' keys.
After sharing group signature with all group members, group members will be able to start secure data sharing by uploading and downloading the files as shown in Figure 2.
Figure 3 illustrates a sequence diagramin accordance with an embodiment of the present disclosure. The below figure shows the sequence diagram of proposed system in this system the group member calculate and send value or generated key to the group Manager here again calculation is done the final report is send to group member with encrypting data and finally generated key are used and this can be decrypt using secret key of group member. Through this method one can securely share the data in the cloud as in Figure 3.
In Linear Feedback Shift Register (LFSR), public key is provided to each user of a particular group which is considered as a group key and a private key for each member of a group as password. The data creation/deletion and new user addition/deletion in a group just affect the respective user without involving any other system resources. And also the issue of user revocation is solved using fine grained access system which is highly secured.
The home page is signed by a community member. In every community that is formed by itself, she/he generates a Group Member. A Community Manager collects the information of the Individual and with each member generates a private key. The Secret Key is issued with Community Name, Member ID and Private Key Group. The Secret Key
(DES) is protected and submits the members' privacy key. Detailed Community representatives are held in the cloud (Edit, View). To revoke a member, list the member, pick the member to be removed, and click expulsion, and then include a member ID in the list of dismissals. If required, a Group Manager may alter a password.
A participant of the party is signed into the website. Participant should upload a community image and have to pick the file from the local framework for uploading a file. The costumer must enter his private key, uncode his private key and receive Community ID, User ID and Private Group Key. Encrypt the file with Community Private Key (AES). The signature is generated by the technique Hashing. User ID, Community ID, Log, Signature and time update a table. Then upload the protected cloud image. If required, a Community Member would be able to modify the password.
The costumer chooses the Community to import the file. Enter the local system's private key along with a downloadable file. Un coded Secret Key and obtained Community Name, Account ID and Private Key Group. Check Category ID and the Group chosen [if you don't deny here]. Get the Community ID-based cancellation list and search User ID in the cancellation list. Stop the mechanism if present.
It also contributed to the introduction of programmers for automated personal authentication, meaning that only the right individuals have the right access. Personal checking can usually be carried out using:
1. The individual's physical mechanism
2. Knowledge Information
3. Characteristics in own recognition.
High performance signature verification systems (SVS) are the most relevant attempts at signature verification focused on popular awareness that the signature apposition mechanism is a product of ballistic body gestures, namely fast motions, with no sensory input, yet predetermined by brain.
Signing is also somewhat distinct from most processes in handwriting. In reality, as opposed to slow and accurate regulated motions, ballistic movements are fast motions whose precision improves with pace. In addition, while the signature still includes details about the signatory, it relies on several physical and cultural aspects as a rather individual organization.
Computational challenges exist in a variety of applications, and it is highly practical and also economically necessary to be able to overcome them as effectively as practicable. For example, pacing, distribution of resources; development and optimization preparation, machine assisted design and the verification of software are examples of such problems.
Many of these problems are rough on the NP and called computer intractable because in the worst case (unless NP=P) there is no polynomial time approach. However it is also possible to solve these 'irritable' problems remarkably successfully by means of precisely constructed heuristic strategies. The effectiveness of these processes, which is essentially observed, remains usually unavailable to computational methods used to explain scientific difficulty effects and must instead be empirically determined on the basis of precisely constructed machine experiments.
The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, orders of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples. Numerous variations, whether explicitly given in the specification or not, such as differences in structure, dimension, and use of material, are possible. The scope of embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any component(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature or component of any or all the claims.

Claims (8)

WE CLAIM:
1. A method for secured data sharing in an un trusted cloud storage, the method comprises:
providing any user of a specific community with a public key for each group member as a password; allowing generation/deletion of data and addition/deletion of new customer data in a community impact the users without any external structures and tackling problem of revocation of users thoroughly with a highly safe, fine-grained access mechanism; employing an encryption method to promote protected information sharing on many servers which are not trusted ones; splitting complete file into file groups and encoding specific file block keys of each file section by the data owner; generating a significant file transfer overhead thereby changing and distributing the file block key to delete the costumer again; and offering a secure way to connect the data with active cloud customers and maximum degree of protection by issuing a special secret key to each person.
2. The method as claimed in claim 1, wherein the users utilizes the specific file block keys to encode the different file keys.
3. The method as claimed in claim 1, wherein data are exchanged solely with the cloud members of the cloud community.
4. The method as claimed in claim 1, wherein the login and cancellation of eligible community participants allows
5. The method as claimed in claim 1, wherein any participant of the cloud is allowed to save and add data with the same community.
6. The method as claimed in claim 1, wherein users are deleted from a category if necessary and group manager is not allowed to change the other participants' keys.
7. The method as claimed in claim 1, wherein after sharing group signature with all group members, group members are able to start secure data sharing by uploading and downloading the files.
8. The method as claimed in claim 1, wherein the group member calculates and send value or generated key to the group Manager thereby calculating and sending final report to group member with encrypting data and finally generated key are used, which is further decrypt using secret key of group member.
providing any user of a specific community with a public key for each group member as a password 102
allowing generation/deletion of data and addition/deletion of new customer data in a community 104 impact the users without any external structures and tackling problem of revocation of users thoroughly with a highly safe, fine-grained access mechanism
employing an encryption method to promote protected information sharing on many servers which 106 are not trusted ones
splitting complete file into file groups and encoding specific file block keys of each file section by the 108 data owner
generating a significant file transfer overhead thereby changing and distributing the file block key to 110 delete the costumer again
offering a secure way to connect the data with active cloud customers and maximum degree of 112 protection by issuing a special secret key to each person
Figure 1
Figure 2
Figure 3
AU2021106271A 2021-08-21 2021-08-21 A method for secured data sharing in an untrusted cloud storage Ceased AU2021106271A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021106271A AU2021106271A4 (en) 2021-08-21 2021-08-21 A method for secured data sharing in an untrusted cloud storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021106271A AU2021106271A4 (en) 2021-08-21 2021-08-21 A method for secured data sharing in an untrusted cloud storage

Publications (1)

Publication Number Publication Date
AU2021106271A4 true AU2021106271A4 (en) 2021-12-09

Family

ID=78819085

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021106271A Ceased AU2021106271A4 (en) 2021-08-21 2021-08-21 A method for secured data sharing in an untrusted cloud storage

Country Status (1)

Country Link
AU (1) AU2021106271A4 (en)

Similar Documents

Publication Publication Date Title
Lim et al. Blockchain technology the identity management and authentication service disruptor: a survey
CN106537403B (en) System for accessing data from multiple devices
JP2023502346A (en) Quantum secure networking
CN110572258B (en) Cloud password computing platform and computing service method
Somu et al. Authentication service in hadoop using one time pad
CN113676334B (en) Block chain-based distributed edge equipment identity authentication system and method
EP3185465A1 (en) A method for encrypting data and a method for decrypting data
CN115333840B (en) Resource access method, system, equipment and storage medium
Ghaffari et al. Identity and access management using distributed ledger technology: A survey
Sain et al. A survey on the security in cyber physical system with multi-factor authentication
Chidambaram et al. Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
Neela et al. An improved RSA technique with efficient data integrity verification for outsourcing database in cloud
Kousalya et al. Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique
Vignesh et al. Secured Data Access and Control Abilities Management over Cloud Environment using Novel Cryptographic Principles
AU2021106271A4 (en) A method for secured data sharing in an untrusted cloud storage
Ghori et al. Review of access control mechanisms in cloud computing
Abdul et al. Dual factor authentication to procure cloud services
Manimuthu et al. RETRACTED ARTICLE: An enhanced approach on distributed accountability for shared data in cloud
Sohrabi et al. Privacy of cloud data using a secure SSO architecture
Megha Authentication of Financial Wallet System and Data Protection using BlockChain
Susilabai et al. A trusted user integrity-based privilege access control (UIPAC) for secured clouds
US11985254B2 (en) Threshold multi-party computation with must-have member
Vibhute Three Factor Data Sharing Mechanism for Cloud Storage System
CN117879819B (en) Key management method, device, storage medium, equipment and computing power service system
Sail et al. A multi-factor authentication scheme to strength data-storage access

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry