Titre et al., 2018 - Google Patents
Access DataPrivacy Management Control inMongoDBTitre et al., 2018
- Document ID
- 3421186307336099655
- Author
- Titre N
- Bhattacharya A
- Publication year
- Publication venue
- 2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)
External Links
Snippet
With the rapid development of network and information technology, data are woven into every corner of our lives, such as websites, social networks, public platforms, etc. Along with the convenience and immediacy of data acquisition, big data technologies, and many other …
- 238000005516 engineering process 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Basharat et al. | Database security and encryption: A survey study | |
EP2831803B1 (en) | Systems and methods for secure third-party data storage | |
US20100095118A1 (en) | Cryptographic key management system facilitating secure access of data portions to corresponding groups of users | |
KR102224998B1 (en) | Computer-implemented system and method for protecting sensitive data via data re-encryption | |
US10635824B1 (en) | Methods and apparatus for private set membership using aggregation for reduced communications | |
CN103281377A (en) | Cryptograph data storage and searching method for cloud | |
US20210392003A1 (en) | Decentralized computing systems and methods for performing actions using stored private data | |
Khalaf et al. | A survey of access control and data encryption for database security | |
Tian et al. | DSP RE-Encryption: A flexible mechanism for access control enforcement management in DaaS | |
Kumar | Cryptography during data sharing and accessing over cloud | |
Tian et al. | DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS. | |
Titre et al. | Access DataPrivacy Management Control inMongoDB | |
CN116800398A (en) | SSE and blockchain-based supply chain information ciphertext searchable system | |
Xie et al. | Assured Deletion: A Scheme Based on Strong Nonseparability | |
Tian et al. | A trusted control model of cloud storage | |
ArockiamȦ et al. | Security framework to ensure the confidentiality of outsourced data in public cloud storage | |
Muhammad et al. | Current issues in Ciphertext Policy-Attribute based scheme for cloud computing: A survey | |
Inampudi et al. | Key Management for protection of health care Data of Multi-user using Access control in Cloud Environment | |
K Santhi | A Comparative Analysis On The Combined Multi Level Functionality Framework In Cloud Environment With Enhanced Data Security Levels For Privacy Preservation | |
Anantharam et al. | PRIVACY-PRESERVING IN CLOUD COMPUTING FOR DATA STORAGE SECURITY FRAMEWORK USING REGENERATING HOMOMORPHIC ENCRYPTION | |
Hamdi et al. | A security novel for a networked database | |
Yang et al. | A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption | |
Reddy et al. | Cryptographic key management scheme for supporting multi-user SQL queries over encrypted databases | |
US20230418953A1 (en) | Secure high scale cryptographic computation through delegated key access | |
Aarthi et al. | Enabling efficient and protected sharing of data in cloud computing |