Cryptographic Cloud Storage
نویسندگان
چکیده
Advances in networking technology and an increase in the need for computing resources have prompted many organizations to outsource their storage and computing needs. This new economic and computing model is commonly referred to as cloud computing and includes various types of services such as: infrastructure as a service (IaaS), where a customer makes use of a service provider’s computing, storage or networking infrastructure; platform as a service (PaaS), where a customer leverages the provider’s resources to run custom applications; and finally software as a service (SaaS), where customers use software that is run on the provider’s infrastructure.
منابع مشابه
Enhanced Security Architecture for Cloud Data Security
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud environment in plain text format may be main security threat. So, it is the responsibility of cloud service providers to ensure privacy and security of data on storage as well as network level. The following three parameters confidentiality, integrity and availability de...
متن کاملReview On: Cryptographic Algorithms for Data Integrity Proofs in Cloud Storage
In cloud computing , there are many cryptographic algorithm for storing and retrieving data , the cryptographic algorithm is more secure and highly well organized and successful in the field of authenticate information and keep the information private. This paper discusses cryptographic algorithms for data integrity proofs in cloud storage. Data integrity has been proved in cloud by enhancing t...
متن کاملK2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
Security and privacy concerns hinder the adoption of cloud storage and computing in sensitive environments. We present a user-centric privacypreserving cryptographic access control protocol called K2C (Key To Cloud) that enables end-users to securely store, share, and manage their sensitive data in an untrusted cloud storage anonymously. K2C is scalable and supports the lazy revocation. It can ...
متن کاملSDOS: Using Trusted Platform Modules for Secure Cryptographic Deletion in the Swift Object Store
The secure deletion of data is becoming increasingly important to individuals, corporations as well as governments. Recent advances in worldwide laws and regulations now require secure deletion for sensitive data in certain industries. Data leaks in the public and private sector are commonplace today, and they often reveal data which was supposed to be deleted. Secure deletion describes any mec...
متن کاملWESHARE: A Coercion-Resistant and Scalable Storage Cloud
Several cloud providers encrypt user data as best practices to protect against internal data theft. However, recent incidents have shown that cloud providers can be forced or coerced by governments, legal authorities or overtly malicious external attackers to decrypt user data when necessary. We define a property called coercion-resistance that frees cloud providers from the liability to decryp...
متن کاملCS2: A Searchable Cryptographic Cloud Storage System
Cloud storage provides a highly available, easily accessible and inexpensive remote data repository to clients who cannot afford to maintain their own storage infrastructure. While many applications of cloud storage require security guarantees against the cloud provider (e.g., storage of high-impact business data or medical records), most services cannot guarantee that the provider will not see...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010