Cryptography in the cloud : advances and challenges

Boyd, Colin (2013) Cryptography in the cloud : advances and challenges. Journal of Information and Communication Convergence Engineering, 11(1), pp. 17-23.

View at publisher (open access)

Abstract

Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

Impact and interest:

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

ID Code: 68722
Item Type: Journal Article
Refereed: Yes
Additional URLs:
Keywords: Cloud computing, Cryptography, Information security
DOI: 10.6109/jicce.2013.11.1.017
ISSN: 2234-5973
Divisions: Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: Copyright 2013 The Korea Institute of Information and Communication Engineering
Copyright Statement: This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/li-censes/bync/
3.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Deposited On: 19 Mar 2014 01:33
Last Modified: 19 Mar 2014 22:11

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page