Cryptography in the cloud : advances and challenges


Autoria(s): Boyd, Colin
Data(s)

01/03/2013

Resumo

Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

Identificador

http://eprints.qut.edu.au/68722/

Publicador

The Korea Institute of Information and Communication Engineering

Relação

DOI:10.6109/jicce.2013.11.1.017

Boyd, Colin (2013) Cryptography in the cloud : advances and challenges. Journal of Information and Communication Convergence Engineering, 11(1), pp. 17-23.

Direitos

Copyright 2013 The Korea Institute of Information and Communication Engineering

This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/li-censes/bync/ 3.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Cloud computing #Cryptography #Information security
Tipo

Journal Article