IN2013CH05992A - - Google Patents

Download PDF

Info

Publication number
IN2013CH05992A
IN2013CH05992A IN5992CH2013A IN2013CH05992A IN 2013CH05992 A IN2013CH05992 A IN 2013CH05992A IN 5992CH2013 A IN5992CH2013 A IN 5992CH2013A IN 2013CH05992 A IN2013CH05992 A IN 2013CH05992A
Authority
IN
India
Prior art keywords
data
unconnected
sentinel
trusted device
terminal
Prior art date
Application number
Inventor
Saxena Ashutosh
Singh Chauhan Nitin
R Sravan
Original Assignee
Infosys Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Infosys Ltd filed Critical Infosys Ltd
Priority to IN5992CH2013 priority Critical patent/IN2013CH05992A/en
Priority to US14/561,992 priority patent/US9641617B2/en
Publication of IN2013CH05992A publication Critical patent/IN2013CH05992A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention provides a method and system for verifying integrity of cloud data using unconnected trusted device. The method involves requesting encrypted data though a terminal from a metadata offsite location on a cloud storage then entering encrypted data into an unconnected trusted device thereafter obtaining sentinel data from one or more predefined sentinel locations in encrypted data then requesting original data from the cloud storage through the terminal from the unconnected trusted device thereafter comparing sentinel data and original data for integrity and finally displaying the results. REF FIG: 1
IN5992CH2013 2013-12-20 2013-12-20 IN2013CH05992A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IN5992CH2013 IN2013CH05992A (en) 2013-12-20 2013-12-20
US14/561,992 US9641617B2 (en) 2013-12-20 2014-12-05 System and method for verifying integrity of cloud data using unconnected trusted device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN5992CH2013 IN2013CH05992A (en) 2013-12-20 2013-12-20

Publications (1)

Publication Number Publication Date
IN2013CH05992A true IN2013CH05992A (en) 2015-06-26

Family

ID=53401384

Family Applications (1)

Application Number Title Priority Date Filing Date
IN5992CH2013 IN2013CH05992A (en) 2013-12-20 2013-12-20

Country Status (2)

Country Link
US (1) US9641617B2 (en)
IN (1) IN2013CH05992A (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234504A (en) * 2018-01-12 2018-06-29 安徽大学 Identity-based proxy data integrity detection method in cloud storage
GB2574458A (en) * 2018-06-07 2019-12-11 Gbr14 Ltd Methods and Systems For Secure Data Transmission
CN113472547B (en) * 2021-09-06 2021-11-16 湖南和信安华区块链科技有限公司 Safety monitoring system based on block chain

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2998100A (en) 1999-02-18 2000-09-04 Sun Microsystems, Inc. Data authentication system employing encrypted integrity blocks
AU6104800A (en) * 1999-07-16 2001-02-05 Intertrust Technologies Corp. Trusted storage systems and methods
US8943551B2 (en) 2008-08-14 2015-01-27 Microsoft Corporation Cloud-based device information storage
US9165154B2 (en) 2009-02-16 2015-10-20 Microsoft Technology Licensing, Llc Trusted cloud computing and services framework
US8601259B2 (en) 2009-04-20 2013-12-03 Cleversafe, Inc. Securing data in a dispersed storage network using security sentinel value
US10104045B2 (en) * 2009-04-20 2018-10-16 International Business Machines Corporation Verifying data security in a dispersed storage network
US20100306076A1 (en) 2009-05-29 2010-12-02 Ebay Inc. Trusted Integrity Manager (TIM)
US8285681B2 (en) * 2009-06-30 2012-10-09 Commvault Systems, Inc. Data object store and server for a cloud storage environment, including data deduplication and data management across multiple cloud storage sites
KR101263217B1 (en) 2009-10-15 2013-05-10 한국전자통신연구원 Mobile terminal for providing mobile cloud service and operating method of the same
US9537650B2 (en) 2009-12-15 2017-01-03 Microsoft Technology Licensing, Llc Verifiable trust for data through wrapper composition
US8843614B2 (en) 2009-12-21 2014-09-23 Electronics And Telecommunications Research Institute Apparatus and method for distributing cloud computing resources using mobile devices
US8452932B2 (en) 2010-01-06 2013-05-28 Storsimple, Inc. System and method for efficiently creating off-site data volume back-ups
US8707091B2 (en) 2010-03-15 2014-04-22 Cleversafe, Inc. Failsafe directory file system in a dispersed storage network
US8694467B2 (en) 2010-03-31 2014-04-08 Xerox Corporation Random number based data integrity verification method and system for distributed cloud storage
US8452957B2 (en) 2010-04-27 2013-05-28 Telefonaktiebolaget L M Ericsson (Publ) Method and nodes for providing secure access to cloud computing for mobile users
EP3015988A1 (en) 2010-08-12 2016-05-04 Security First Corp. Systems and methods for secure remote storage of data
US9171162B2 (en) * 2011-03-29 2015-10-27 Microsoft Technology Licensing, Llc Random file request for software attestation
US8595818B2 (en) * 2011-06-01 2013-11-26 Raytheon Bbn Technologies Corp. Systems and methods for decoy routing and covert channel bonding
JP5853507B2 (en) * 2011-09-05 2016-02-09 ソニー株式会社 Information processing apparatus, information processing system, information processing method, and program
EP3660673A1 (en) * 2012-03-22 2020-06-03 Irdeto B.V. Updating software components
US20150288703A1 (en) * 2012-10-31 2015-10-08 Hitachi, Ltd. Data possession verification system and method
GB2505533B (en) * 2012-12-14 2014-07-09 F Secure Corp Security method and apparatus
US9253171B2 (en) * 2013-06-20 2016-02-02 Raytheon Cyber Products, Llc Distributed network encryption key generation

Also Published As

Publication number Publication date
US20150180835A1 (en) 2015-06-25
US9641617B2 (en) 2017-05-02

Similar Documents

Publication Publication Date Title
EP4343673A3 (en) Digital identification system
ZA201904157B (en) Certificate verifying method, device, computer device and storage medium
TW201614501A (en) Systems and methods for segmenting data structures in a memory system
SG2013042429A (en) Method for receiving an electronic receipt of an electronic payment transaction into a mobile device
SG10201709367UA (en) System of enclaves
GB2556850A (en) Sequentially overlaying media content
MX2016000883A (en) Media distribution system with manifest-based entitlement enforcement.
MX2018009876A (en) Media encapsulating and decapsulating.
SG10201810140QA (en) Remote server encrypted data provisioning system and methods
MY177409A (en) Method and system for verifying an account operation
MX2015009172A (en) Systems and methods for identifying and reporting application and file vulnerabilities.
EP3217710A4 (en) Method, system and relevant device for measuring unauthorized carrier, and computer storage medium
WO2014105357A3 (en) Systems and methods for data entry in a non-destructive testing system
MX353611B (en) Systems and methods to initiate a verification test within a flow meter via a flow computer.
WO2014120410A3 (en) Landmark based positioning with verbal input
MX2017003731A (en) Systems and methods for identifying mobile devices.
EP3200484A4 (en) Indication information determining and processing methods and devices, request message processing method and device, and computer storage medium
MX362169B (en) Process system managmenet system, server device, management program, and management method.
MX360345B (en) Systems and methods for determining amount of liquid and gaseous fuel.
BR112016015416A2 (en) DEVICE, METHOD, AND SYSTEM FOR GENERATION OF A DIGITAL SIGNATURE
MX2016016009A (en) Systems and methods for a credential including multiple access privileges.
MX2015010893A (en) Systems and methods of risk based rules for application control.
GB2534732A (en) Multivariate testing of mobile applications
WO2014137820A3 (en) Systems and methods for associating microposts with geographic locations
EP3722973A4 (en) Data processing method and device for distributed database, storage medium, and electronic device