Abstract
The market for cloud computing can be considered as the major growth area in ICT. However, big companies and public authorities are reluctant to entrust their most sensitive data to external parties for storage and processing. The reason for their hesitation is clear: There exist no satisfactory approaches to adequately protect the data during its lifetime in the cloud. The EU Project Prismacloud (Horizon 2020 programme; duration 2/2015–7/2018) addresses these challenges and yields a portfolio of novel technologies to build security enabled cloud services, guaranteeing the required security with the strongest notion possible, namely by means of cryptography. We present a new approach towards a next generation of security and privacy enabled services to be deployed in only partially trusted cloud infrastructures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
e.g., ABC4Trust: https://abc4trust.eu/.
- 5.
EU-FP7 SIMON Project: http://www.simon-project.eu.
References
Andersson, C., Camenisch, J., Crane, S., Fischer-Hübner, S., Leenes, R., Pearson, S., Pettersson, J.S., Sommer, D.: Trust in PRIME. In: ISSPIT, pp. 552–559 (2005)
Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: ACM CCS, pp. 863–874. ACM (2013)
Beek, M.T., Bucchiarone, A., Gnesi, S.: A Survey on Service Composition Approaches: From Industrial Standards to Formal Methods. Technical report 2006-TR-15 (2006)
Bessani, A., Correia, M., Quaresma, B., André, F., Sousa, P.: Depsky: dependable and secure storage in a cloud-of-clouds. Trans. Storage 9(4), 1–12 (2013)
Bleikertz, S., Groß, T.: A virtualization assurance language for isolation and deployment. In: POLICY. IEEE, June 2011
Bleikertz, S., Groß, T., Mödersheim, S.: Security analysis of dynamic infrastructure clouds (extended abstract), September 2013
Bleikertz, S., Groß, T., Schunter, M., Eriksson, K.: Automated information flow analysis of virtualized infrastructures. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 392–415. Springer, Heidelberg (2011)
Bleikertz, S., Vogel, C., Groß, T.: Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures. In: ACSAC, pp. 26–35. ACM (2014)
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: ACM CCS, pp. 225–234. ACM Press (2004)
Buchmann, J., Demirel, D., van de Graaf, J.: Towards a publicly-verifiable mix-net providing everlasting privacy. In: Financial Cryptography, pp. 197–204 (2013)
Camenisch, J., Herreweghen, E.V.: Design and implementation of the idemix anonymous credential system. In: ACM CCS, pp. 21–30. ACM (2002)
Canard, S., Lescuyer, R.: Protecting privacy by sanitizing personal data: a new approach to anonymous credentials. In: ASIA CCS, pp. 381–392. ACM (2013)
Catalano, D.: Homomorphic signatures and message authentication codes. In: Abdalla, M., De Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 514–519. Springer, Heidelberg (2014)
Catalano, D., Marcedone, A., Puglisi, O.: Authenticating computation on groups: new homomorphic primitives and applications. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014, Part II. LNCS, vol. 8874, pp. 193–212. Springer, Heidelberg (2014)
Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S.: Malleable signatures: new definitions and delegatable anonymous credentials. In: CSF, pp. 199–213. IEEE (2014)
Cloud Security Alliance: Cloud security alliance website (2009). https://cloudsecurityalliance.org. Accessed 31 March 2015
Danezis, G., Kohlweiss, M., Rial, A.: Differentially private billing with rebates. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 148–162. Springer, Heidelberg (2011)
Di Lorenzo, G., Hacid, H., Benatallah, B., Paik, H.Y.: Data integration in mashups. Sigmod Rec. 38(1), 59–66 (2009)
Erl, T.: Service-Oriented Architecture: Concepts, Technology, and Design. Pearson Education India, Delhi (2006)
European Commission: European cloud computing strategy “unleashing the potential of cloud computing in europe” (2012). http://ec.europa.eu/digital-agenda/en/european-cloud-computing-strategy. Accessed 31 March 2015
European Union Agency for Network and Information Security-ENISA: Cloud computing repository. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing
Fiore, D., Gennaro, R., Pastro, V.: Efficiently verifiable computation on encrypted data. In: ACM CCS, pp. 844–855 (2014)
Ghernaouti-Helie, S.: Cyber Power - Crime. Conflict and Security in Cyberspace. EPFL Press, Burlington (2013)
Groß, T.: Signatures and efficient proofs on committed graphs and NP-statements. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 293–314. Springer, Heidelberg (2015)
Gupta, V.H., Gopinath, K.: \(\text{ G }_{\text{ its }}^2\) vsr: an information theoretical secure verifiable secret redistribution protocol for long-term archival storage. In: Security in Storage Workshop, SISW 2007, pp. 22–33. IEEE Computer Society, Washington, DC, USA (2007). http://dx.doi.org/10.1109/SISW.2007.9
Hanser, C., Slamanig, D.: Blank digital signatures. In: ASIA CCS. ACM (2013)
Hanser, C., Slamanig, D.: Structure-preserving signatures on equivalence classes and their application to anonymous credentials. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 491–511. Springer, Heidelberg (2014)
Harbach, M., Fahl, S., Rieger, M., Smith, M.: On the acceptance of privacy-preserving authentication technology: the curious case of national identity cards. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 245–264. Springer, Heidelberg (2013)
Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)
Moran, T., Naor, M.: Split-ballot voting: everlasting privacy with distributed trust. ACM Trans. Inf. Syst. Secur. 13(2), 246–255 (2010)
Müller-Quade, J., Unruh, D.: Long-term security and universal composability. J. Cryptol. 23(4), 594–671 (2010)
National Institute of Standards and Technology-NIST: Cloud computing program. http://www.nist.gov/itl/cloud/index.cfm. Accessed 31 March 2015
Paquin, C., Zaverucha, G.: U-prove cryptographic specification v1.1, revision 3. Technical report, Microsoft Corporation (2013)
Pfeffer, H., Linner, D., Steglich, S.: Modeling and controlling dynamic service compositions. In: Computing in the Global Information Technology, pp. 210–216. IEEE (2008)
Pöhls, H.C., Samelin, K.: On updatable redactable signatures. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 457–475. Springer, Heidelberg (2014)
PRWeb: A cloud computing forecast summary for 2013–2017 from idc, gartner and kpmg, citing a study by accenture (2013). http://www.prweb.com/releases/2013/11/prweb11341594.htm. Accessed 31 March 2015
Schiffman, J., Sun, Y., Vijayakumar, H., Jaeger, T.: Cloud verifier: verifiable auditing service for IaaS clouds. In: CSA, June 2013
Slamanig, D.: Efficient schemes for anonymous yet authorized and bounded use of cloud resources. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 73–91. Springer, Heidelberg (2012)
Slamanig, D., Hanser, C.: On cloud storage and the cloud of clouds approach. In: ICITST-2012, pp. 649–655. IEEE Press (2012)
Steinfeld, R., Bull, L., Zheng, Y.: Content extraction signatures. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, p. 285. Springer, Heidelberg (2002)
Transparency Market Research: Cloud computing services market - global industry size, share, trends, analysis and forecasts 2012–2018 (2012). http://www.transparencymarketresearch.com/cloud-computing-services-market.html. Accessed 31 March 2015
Walfish, M., Blumberg, A.J.: Verifying computations without reexecuting them. Commun. ACM 58(2), 74–84 (2015)
Wästlund, E., Angulo, J., Fischer-Hübner, S.: Evoking comprehensive mental models of anonymous credentials. In: iNetSeC, pp. 1–14 (2011)
Acknowledgements
This work has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 644962.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Lorünser, T. et al. (2015). Towards a New Paradigm for Privacy and Security in Cloud Services. In: Cleary, F., Felici, M. (eds) Cyber Security and Privacy. CSP 2015. Communications in Computer and Information Science, vol 530. Springer, Cham. https://doi.org/10.1007/978-3-319-25360-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-25360-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25359-6
Online ISBN: 978-3-319-25360-2
eBook Packages: Computer ScienceComputer Science (R0)