Titre et al., 2018 - Google Patents

Access DataPrivacy Management Control inMongoDB

Titre et al., 2018

Document ID
3421186307336099655
Author
Titre N
Bhattacharya A
Publication year
Publication venue
2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)

External Links

Snippet

With the rapid development of network and information technology, data are woven into every corner of our lives, such as websites, social networks, public platforms, etc. Along with the convenience and immediacy of data acquisition, big data technologies, and many other …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer

Similar Documents

Publication Publication Date Title
Basharat et al. Database security and encryption: A survey study
EP2831803B1 (en) Systems and methods for secure third-party data storage
US20100095118A1 (en) Cryptographic key management system facilitating secure access of data portions to corresponding groups of users
KR102224998B1 (en) Computer-implemented system and method for protecting sensitive data via data re-encryption
US10635824B1 (en) Methods and apparatus for private set membership using aggregation for reduced communications
CN103281377A (en) Cryptograph data storage and searching method for cloud
US20210392003A1 (en) Decentralized computing systems and methods for performing actions using stored private data
Khalaf et al. A survey of access control and data encryption for database security
Tian et al. DSP RE-Encryption: A flexible mechanism for access control enforcement management in DaaS
Kumar Cryptography during data sharing and accessing over cloud
Tian et al. DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS.
Titre et al. Access DataPrivacy Management Control inMongoDB
CN116800398A (en) SSE and blockchain-based supply chain information ciphertext searchable system
Xie et al. Assured Deletion: A Scheme Based on Strong Nonseparability
Tian et al. A trusted control model of cloud storage
ArockiamȦ et al. Security framework to ensure the confidentiality of outsourced data in public cloud storage
Muhammad et al. Current issues in Ciphertext Policy-Attribute based scheme for cloud computing: A survey
Inampudi et al. Key Management for protection of health care Data of Multi-user using Access control in Cloud Environment
K Santhi A Comparative Analysis On The Combined Multi Level Functionality Framework In Cloud Environment With Enhanced Data Security Levels For Privacy Preservation
Anantharam et al. PRIVACY-PRESERVING IN CLOUD COMPUTING FOR DATA STORAGE SECURITY FRAMEWORK USING REGENERATING HOMOMORPHIC ENCRYPTION
Hamdi et al. A security novel for a networked database
Yang et al. A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption
Reddy et al. Cryptographic key management scheme for supporting multi-user SQL queries over encrypted databases
US20230418953A1 (en) Secure high scale cryptographic computation through delegated key access
Aarthi et al. Enabling efficient and protected sharing of data in cloud computing