AU2021106271A4 - A method for secured data sharing in an untrusted cloud storage - Google Patents
A method for secured data sharing in an untrusted cloud storage Download PDFInfo
- Publication number
- AU2021106271A4 AU2021106271A4 AU2021106271A AU2021106271A AU2021106271A4 AU 2021106271 A4 AU2021106271 A4 AU 2021106271A4 AU 2021106271 A AU2021106271 A AU 2021106271A AU 2021106271 A AU2021106271 A AU 2021106271A AU 2021106271 A4 AU2021106271 A4 AU 2021106271A4
- Authority
- AU
- Australia
- Prior art keywords
- data
- file
- community
- cloud
- users
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000003860 storage Methods 0.000 title claims abstract description 17
- 238000012217 deletion Methods 0.000 claims abstract description 12
- 230000037430 deletion Effects 0.000 claims abstract description 12
- 230000007246 mechanism Effects 0.000 claims abstract description 8
- 238000012546 transfer Methods 0.000 claims abstract description 5
- 230000008859 change Effects 0.000 claims description 4
- 230000008901 benefit Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 230000033001 locomotion Effects 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 238000013459 approach Methods 0.000 description 2
- UKONDVCFRDXXMY-UHFFFAOYSA-N NP=P Chemical compound NP=P UKONDVCFRDXXMY-UHFFFAOYSA-N 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000000205 computational method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000009413 insulation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000011176 pooling Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The method for secured data sharing in an un trusted cloud storage
comprises providing any user of a specific community with a public key
for each group member as a password; allowing generation/deletion of
data and addition/deletion of new customer data in a community impact
the users without any external structures and tackling problem of
revocation of users thoroughly with a highly safe, fine-grained access
mechanism; employing an encryption method to promote protected
information sharing on many servers which are not trusted ones; splitting
complete file into file groups and encoding specific file block keys of each
file section by the data owner; generating a significant file transfer
overhead thereby changing and distributing the file block key to delete
the costumer again; and offering a secure way to connect the data with
active cloud customers and maximum degree of protection by issuing a
special secret key to each person.
16
0N 0 0 0 N
30 4
S E --N
0. > ~ -2 .2
co 0 I -0
C.) m ) uc
CU C 0 L - E
cu -u
14- a) E 20 Lm 0 R) .
E E -C 4
cu i- w0 CU cu t
cu -c E )
CU -E -0 0C 0- 0 4-. 40$ c~n 0 M
0 EI ' L
p CO W 0u >- $-. -0
tw .2E -Ne~ ~~ j
-C Co ~ C ~ L
m 0)~ u -00c
a) 0 CU4
CU tw U - co 0 -i 0 4.C .
4 -- EL '' C
0 CC 0f $- -ET c ac
-N 4511 0 1
a 00 CU >L W
_0 (A4(Ln4
2 : 4-- 4U 0 u
0o o 00
. ,4 _: -u -C.
19 *9C- 0
Cu 0 -0
CU CU 0) CU _ U 4
_0 :E E L - C 4- U 0o
0 o C:A 0.C
M )0 L- U0 ) L.0
> Cu CL >. 0)(A
C CU2CUC
0
C a) CM
0 0 0)
o 0)
2L C2 = 0
%. 0) 0)
Description
N 0 0 0 N
30 4
co 0. 0 > ~ I -2.2 -0 C.) m ) uc CU C 0 L - E
cu -u 20 Lm 0 14- a) ER)
. E E -C 4
cu i- w0 CU cu t cu -c E
) CU -E 0C -0 0$ 0- 0 c~n 0 M 4-. 4
0 EI ' L p CO W 0u >- $-. -0 tw .2E -Ne~ ~~ j -C Co ~ C ~ L
m 0)~ u -00c a) 0 CU4 CU tw U - 0 co 0 -i 4.C.
4 -- EL C 0CC 0f $- -ET c '' ac -N 4511 0 1 a00 CU >L W _0 (A4(Ln4
2 : 4-- 4U 0 u 0o o 00
. ,4 _: -u -C. 19 *9C- 0 Cu 0 -0 CU CU 0) CU _ U 4 0 _0 :E E L - C 4- o U 0 o C:A 0.C
M )0L- U0 ) L.0 > Cu CL >. 0)(A C CU2CUC 0 C a) CM 0 0 0) o 0)
= 2L C2 0
%. 0) 0)
FIELDOFTHEINVENTION The present disclosure relates to a method for secured data sharing in an un trusted cloud storage.
BACKGROUND OF THE INVENTION Cloud computing is an emerging area which basically provides enormous services on the basis of pay as you go. Most commonly used service provided by cloud is data storage. Cloud services are the most cost effective and an efficient solution for utilizing resources among various cloud users. It is very difficult to set an efficient data sharing scheme for groups in cloud because cloud users are very reluctant to share their identity and at the same time all cloud users are expecting cloud to provide cost effective services.
The cloud storage facility can be used instead of saved online documents, images or videos, or even one can use a webmail or social networking platforms. If for a business, one chooses to use a web invoicing service for example, rather than upgrading the in-house or manual storage one used for several years, the online invoicing service might be a cloud storage service. Cloud infrastructure relates to the availability of network computing services. Instead of using a web enabled service to store information or to use the cloud instead of storing the data on own disc or upgrading apps for different purposes.
Cloud platforms allow individuals and organizations to utilize remote third-party applications and hardware. The cloud resources available include online storing of data, on-line business software, webmail and websites. The Cloud infrastructure paradigm enables access from everywhere a network link to knowledge and data services. A common pool of services is created by cloud infrastructure, including servers, networks, information processing and advanced corporate and costumer software.
Cloud hosting capabilities include self-service on-demand, wide network connectivity, pooling of resources and quick flexibility. Self service on demand ensures that costumers (usually companies) may order and handle their own machine services. Broad network connectivity allows for internet resources. Pooled services imply that clients draw from a computer pool, mostly in isolated data centres. Products can often be more or less scaled, and costumer use is calculated and appropriately billed.
In the view of the forgoing discussion, it is clearly portrayed that there is a need to have a method for secured data sharing in an un trusted cloud storage.
The present disclosure seeks to provide a method for secured data sharing in an un trusted cloud storage among various users in a group in a secured manner.
In an embodiment, a method for secured data sharing in an un trusted cloud storage is disclosed. The method includes providing any user of a specific community with a public key for each group member as a password. The method further includes allowing generation/deletion of data and addition/deletion of new customer data in a community impact the users without any external structures and tackling problem of revocation of users thoroughly with a highly safe, fine-grained access mechanism. The method further includes employing an encryption method to promote protected information sharing on many servers which are not trusted ones. The method further includes splitting complete file into file groups and encoding specific file block keys of each file section by the data owner. The method further includes generating a significant file transfer overhead thereby changing and distributing the file block key to delete the costumer again. The method further includes offering a secure way to connect the data with active cloud customers and maximum degree of protection by issuing a special secret key to each person.
In an embodiment, the users utilizes the specific file block keys to encode the different file keys.
In an embodiment, data are exchanged solely with the cloud members of the cloud community.
In an embodiment, the login and cancellation of eligible community participants allows, wherein any participant of the cloud is allowed to save and add data with the same community.
In an embodiment, users are deleted from a category if necessary and group manager is not allowed to change the other participants' keys.
In an embodiment, after sharing group signature with all group members, group members are able to start secure data sharing by uploading and downloading the files.
In an embodiment, the group member calculates and send value or generated key to the group Manager thereby calculating and sending final report to group member with encrypting data and finally generated key are used, which is further decrypt using secret key of group member.
An object of the present disclosure is to develop a secured data sharing method for dynamic cloud users.
Another object of the present disclosure is to share any information among various users in a group in a secured manner.
Yet another object of the present invention is to deliver an expeditious and cost-effective method for secured data sharing in an un trusted cloud storage.
To further clarify advantages and features of the present disclosure, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
BRIEFDESCRIPTIONOFFIGURES These and other features, aspects, and advantages of the present disclosure will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Figure lillustrates a flow chart of amethod for secured data sharing in an un trusted cloud storage in accordance with an embodiment of the present disclosure; Figure2illustrates a data flow diagram in accordance with an embodiment of the present disclosure; and Figure 3 illustrates a sequence diagramin accordance with an embodiment of the present disclosure.
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present disclosure. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
DETAILED DESCRIPTION For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as illustrated therein being contemplated as would normally occur to one skilled in the art to which the invention relates.
It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the invention and are not intended to be restrictive thereof.
Reference throughout this specification to "an aspect", "another aspect" or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or sub-systems or elements or structures or components proceeded by "comprises...a" does not, without more constraints, preclude the existence of other devices or other sub-systems or other elements or other structures or other components or additional devices or additional sub-systems or additional elements or additional structures or additional components.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
Embodiments of the present disclosure will be described below in detail with reference to the accompanying drawings.
Referring to Figure 1, a flow chart of amethod for secured data sharing in an un trusted cloud storage is illustrated in accordance with an embodiment of the present disclosure. At step 102, the method 100 includes providing any user of a specific community with a public key for each group member as a password.
At step 104, the method 100 includes allowing generation/deletion of data and addition/deletion of new customer data in a community impact the users without any external structures and tackling problem of revocation of users thoroughly with a highly safe, fine-grained access mechanism.
At step 106, the method 100 includes employing an encryption method to promote protected information sharing on many servers which are not trusted ones.
At step 108, the method 100 includes splitting complete file into file groups and encoding specific file block keys of each file section by the data owner.
At step 110, the method 100 includes generating a significant file transfer overhead thereby changing and distributing the file block key to delete the costumer again.
At step 112, the method 100 includes offering a secure way to connect the data with active cloud customers and maximum degree of protection by issuing a special secret key to each person.
In an embodiment, the users utilizes the specific file block keys to encode the different file keys.
In an embodiment, data are exchanged solely with the cloud members of the cloud community.
In an embodiment, the login and cancellation of eligible community participants allows, wherein any participant of the cloud is allowed to save and add data with the same community.
In an embodiment, users are deleted from a category if necessary and group manager is not allowed to change the other participants' keys.
In an embodiment, after sharing group signature with all group members, group members are able to start secure data sharing by uploading and downloading the files.
In an embodiment, the group member calculates and send value or generated key to the group Manager thereby calculating and sending final report to group member with encrypting data and finally generated key are used, which is further decrypt using secret key of group member.
Figure 2 illustrates a data flow diagram in accordance with an embodiment of the present disclosure.In cloud storage customers do not realize if their data can be processed in the same data center or dispersed via several other data centers. This can be achieved for virtual computers. There is a large probability of user knowledge present in the cloud owing to virtual processing technologies, which allows user details to be readily available from everywhere on the net. Much of the time it is challenging to distinguish authenticated user. This sensitivity to protection and insulation is the product of cloud storage services. The identification information of numerous services rendered by cloud users must be supplied by filling out personal data forms on the internet. This method involves the personal information to be protected until the intruder abuse it. Users have little data transparency and little power over them and this capability is missing in the cloud machine. Users should not realize if the details should be revealed in order to be mindful of the possibility of theft. The cloud service normally fixes this. However no cloud user is informed of the concerns posed for the processing of their results. Data security remains unknown to customers of cloud storage. If data security and privacy problems are considered, the provision of an appropriate remedy is a significant warning.
The data protection and safety of the user and of the cloud must be ensured and different standards vary amongst different customers. The vendors play a large part in confidentiality and privacy in the private cloud, but the cloud user plays a major role with the public cloud. In this scheme the data is protected with the customer's Community Signature and Data Encoding. Owing to this, unable to use the content in the cloud for developers and revoked users. The secrecy of the data is presumably preserved. The real knowledge of the customer is obscured to preserve the protection of identification. In the event of wrong doing and enabling only the approved users to access info, admin has been carrying on traceability and confidentiality to reveal identification.
By utilizing access control, each cloud user however must experience multiple phases, such as registration, verification, permission and accounting to access the information or services. The Role-based Access Control (RBA) approach is used in this definition to access cloud data. Where the cloud user can navigate the device based on the functions. The administrative authorities are responsible for assigning tasks to authorized users. These controls can be interpreted, written and erased. Any member of a community will access and carry out additional operations on files.
Securing data and the protection of identity when exchanging data between cloud users is a difficult problem, since the customer shifts in a community continuously. Here it proposes a secure data exchange system for participating groups inside the external supplier. This is enabled by new encryption strategies under which every user may exchange knowledge with others in a network.
At the similar moment, as the encryption rate and over head of storage of this process increases the revoked users become autonomous. The following attributes refer to this system:
* Any participant of the cloud will save and add data with those of the same community.
• Users can be deleted from a category if necessary. Group manager should not have to change the other participants' keys.
After sharing group signature with all group members, group members will be able to start secure data sharing by uploading and downloading the files as shown in Figure 2.
Figure 3 illustrates a sequence diagramin accordance with an embodiment of the present disclosure. The below figure shows the sequence diagram of proposed system in this system the group member calculate and send value or generated key to the group Manager here again calculation is done the final report is send to group member with encrypting data and finally generated key are used and this can be decrypt using secret key of group member. Through this method one can securely share the data in the cloud as in Figure 3.
In Linear Feedback Shift Register (LFSR), public key is provided to each user of a particular group which is considered as a group key and a private key for each member of a group as password. The data creation/deletion and new user addition/deletion in a group just affect the respective user without involving any other system resources. And also the issue of user revocation is solved using fine grained access system which is highly secured.
The home page is signed by a community member. In every community that is formed by itself, she/he generates a Group Member. A Community Manager collects the information of the Individual and with each member generates a private key. The Secret Key is issued with Community Name, Member ID and Private Key Group. The Secret Key
(DES) is protected and submits the members' privacy key. Detailed Community representatives are held in the cloud (Edit, View). To revoke a member, list the member, pick the member to be removed, and click expulsion, and then include a member ID in the list of dismissals. If required, a Group Manager may alter a password.
A participant of the party is signed into the website. Participant should upload a community image and have to pick the file from the local framework for uploading a file. The costumer must enter his private key, uncode his private key and receive Community ID, User ID and Private Group Key. Encrypt the file with Community Private Key (AES). The signature is generated by the technique Hashing. User ID, Community ID, Log, Signature and time update a table. Then upload the protected cloud image. If required, a Community Member would be able to modify the password.
The costumer chooses the Community to import the file. Enter the local system's private key along with a downloadable file. Un coded Secret Key and obtained Community Name, Account ID and Private Key Group. Check Category ID and the Group chosen [if you don't deny here]. Get the Community ID-based cancellation list and search User ID in the cancellation list. Stop the mechanism if present.
It also contributed to the introduction of programmers for automated personal authentication, meaning that only the right individuals have the right access. Personal checking can usually be carried out using:
1. The individual's physical mechanism
2. Knowledge Information
3. Characteristics in own recognition.
High performance signature verification systems (SVS) are the most relevant attempts at signature verification focused on popular awareness that the signature apposition mechanism is a product of ballistic body gestures, namely fast motions, with no sensory input, yet predetermined by brain.
Signing is also somewhat distinct from most processes in handwriting. In reality, as opposed to slow and accurate regulated motions, ballistic movements are fast motions whose precision improves with pace. In addition, while the signature still includes details about the signatory, it relies on several physical and cultural aspects as a rather individual organization.
Computational challenges exist in a variety of applications, and it is highly practical and also economically necessary to be able to overcome them as effectively as practicable. For example, pacing, distribution of resources; development and optimization preparation, machine assisted design and the verification of software are examples of such problems.
Many of these problems are rough on the NP and called computer intractable because in the worst case (unless NP=P) there is no polynomial time approach. However it is also possible to solve these 'irritable' problems remarkably successfully by means of precisely constructed heuristic strategies. The effectiveness of these processes, which is essentially observed, remains usually unavailable to computational methods used to explain scientific difficulty effects and must instead be empirically determined on the basis of precisely constructed machine experiments.
The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, orders of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples. Numerous variations, whether explicitly given in the specification or not, such as differences in structure, dimension, and use of material, are possible. The scope of embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any component(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature or component of any or all the claims.
Claims (8)
1. A method for secured data sharing in an un trusted cloud storage, the method comprises:
providing any user of a specific community with a public key for each group member as a password; allowing generation/deletion of data and addition/deletion of new customer data in a community impact the users without any external structures and tackling problem of revocation of users thoroughly with a highly safe, fine-grained access mechanism; employing an encryption method to promote protected information sharing on many servers which are not trusted ones; splitting complete file into file groups and encoding specific file block keys of each file section by the data owner; generating a significant file transfer overhead thereby changing and distributing the file block key to delete the costumer again; and offering a secure way to connect the data with active cloud customers and maximum degree of protection by issuing a special secret key to each person.
2. The method as claimed in claim 1, wherein the users utilizes the specific file block keys to encode the different file keys.
3. The method as claimed in claim 1, wherein data are exchanged solely with the cloud members of the cloud community.
4. The method as claimed in claim 1, wherein the login and cancellation of eligible community participants allows
5. The method as claimed in claim 1, wherein any participant of the cloud is allowed to save and add data with the same community.
6. The method as claimed in claim 1, wherein users are deleted from a category if necessary and group manager is not allowed to change the other participants' keys.
7. The method as claimed in claim 1, wherein after sharing group signature with all group members, group members are able to start secure data sharing by uploading and downloading the files.
8. The method as claimed in claim 1, wherein the group member calculates and send value or generated key to the group Manager thereby calculating and sending final report to group member with encrypting data and finally generated key are used, which is further decrypt using secret key of group member.
providing any user of a specific community with a public key for each group member as a password 102
allowing generation/deletion of data and addition/deletion of new customer data in a community 104 impact the users without any external structures and tackling problem of revocation of users thoroughly with a highly safe, fine-grained access mechanism
employing an encryption method to promote protected information sharing on many servers which 106 are not trusted ones
splitting complete file into file groups and encoding specific file block keys of each file section by the 108 data owner
generating a significant file transfer overhead thereby changing and distributing the file block key to 110 delete the costumer again
offering a secure way to connect the data with active cloud customers and maximum degree of 112 protection by issuing a special secret key to each person
Figure 1
Figure 2
Figure 3
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021106271A AU2021106271A4 (en) | 2021-08-21 | 2021-08-21 | A method for secured data sharing in an untrusted cloud storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021106271A AU2021106271A4 (en) | 2021-08-21 | 2021-08-21 | A method for secured data sharing in an untrusted cloud storage |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2021106271A4 true AU2021106271A4 (en) | 2021-12-09 |
Family
ID=78819085
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2021106271A Ceased AU2021106271A4 (en) | 2021-08-21 | 2021-08-21 | A method for secured data sharing in an untrusted cloud storage |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2021106271A4 (en) |
-
2021
- 2021-08-21 AU AU2021106271A patent/AU2021106271A4/en not_active Ceased
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lim et al. | Blockchain technology the identity management and authentication service disruptor: a survey | |
CN106537403B (en) | System for accessing data from multiple devices | |
JP2023502346A (en) | Quantum secure networking | |
CN110572258B (en) | Cloud password computing platform and computing service method | |
Somu et al. | Authentication service in hadoop using one time pad | |
CN113676334B (en) | Block chain-based distributed edge equipment identity authentication system and method | |
EP3185465A1 (en) | A method for encrypting data and a method for decrypting data | |
CN115333840B (en) | Resource access method, system, equipment and storage medium | |
Ghaffari et al. | Identity and access management using distributed ledger technology: A survey | |
Sain et al. | A survey on the security in cyber physical system with multi-factor authentication | |
Chidambaram et al. | Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique | |
Neela et al. | An improved RSA technique with efficient data integrity verification for outsourcing database in cloud | |
Kousalya et al. | Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique | |
Vignesh et al. | Secured Data Access and Control Abilities Management over Cloud Environment using Novel Cryptographic Principles | |
AU2021106271A4 (en) | A method for secured data sharing in an untrusted cloud storage | |
Ghori et al. | Review of access control mechanisms in cloud computing | |
Abdul et al. | Dual factor authentication to procure cloud services | |
Manimuthu et al. | RETRACTED ARTICLE: An enhanced approach on distributed accountability for shared data in cloud | |
Sohrabi et al. | Privacy of cloud data using a secure SSO architecture | |
Megha | Authentication of Financial Wallet System and Data Protection using BlockChain | |
Susilabai et al. | A trusted user integrity-based privilege access control (UIPAC) for secured clouds | |
US11985254B2 (en) | Threshold multi-party computation with must-have member | |
Vibhute | Three Factor Data Sharing Mechanism for Cloud Storage System | |
CN117879819B (en) | Key management method, device, storage medium, equipment and computing power service system | |
Sail et al. | A multi-factor authentication scheme to strength data-storage access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |