Search 닫기

The Korea Institute of Information and Commucation Engineering 2013; 11(1): 17-23

Published online March 31, 2013

https://doi.org/10.6109/jicce.2013.11.1.017

© Korea Institute of Information and Communication Engineering

Cryptography in the Cloud: Advances and Challenges

Boyd, Colin;

School of Electrical Engineering and Computer Science, Queensland University of Technology

Received: October 30, 2012; Accepted: January 10, 2013

Abstract

Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

Keywords Cloud computing, Cryptography, Information security

Article

The Korea Institute of Information and Commucation Engineering 2013; 11(1): 17-23

Published online March 31, 2013 https://doi.org/10.6109/jicce.2013.11.1.017

Copyright © Korea Institute of Information and Communication Engineering.

Cryptography in the Cloud: Advances and Challenges

Boyd, Colin;

School of Electrical Engineering and Computer Science, Queensland University of Technology

Received: October 30, 2012; Accepted: January 10, 2013

Abstract

Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

Keywords: Cloud computing, Cryptography, Information security

JICCE
Sep 30, 2024 Vol.22 No.3, pp. 173~266

Stats or Metrics

Share this article on

  • line

Journal of Information and Communication Convergence Engineering Jouranl of information and
communication convergence engineering
(J. Inf. Commun. Converg. Eng.)

eISSN 2234-8883
pISSN 2234-8255