The Korea Institute of Information and Commucation Engineering 2013; 11(1): 17-23
Published online March 31, 2013
https://doi.org/10.6109/jicce.2013.11.1.017
© Korea Institute of Information and Communication Engineering
Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.
Keywords Cloud computing, Cryptography, Information security
The Korea Institute of Information and Commucation Engineering 2013; 11(1): 17-23
Published online March 31, 2013 https://doi.org/10.6109/jicce.2013.11.1.017
Copyright © Korea Institute of Information and Communication Engineering.
Boyd, Colin;
School of Electrical Engineering and Computer Science, Queensland University of Technology
Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.
Keywords: Cloud computing, Cryptography, Information security