Skip to main content

Cloud Security and Privacy by Design

  • Conference paper
  • First Online:
E-Democracy – Citizen Rights in the World of the New Computing Paradigms (e-Democracy 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 570))

Included in the following conference series:

Abstract

In current cloud paradigms and models, security and privacy are typically treated as add-ons and are not adequately integrated as functions of the cloud systems. The EU Project Prismacloud (Horizon 2020 programme; duration 2/2015–7/2018) sets out to address this challenge and yields a portfolio of novel technologies to build security enabled cloud services, guaranteeing the required security by built-in strong cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Camenisch, J., Lehmann, A., Neven, G.: Electronic identities need private credentials. IEEE Sec. Priv. 10(1), 80–83 (2012). http://doi.ieeecomputersociety.org/10.1109/MSP.2012.7

    Article  Google Scholar 

  2. Catalano, D.: Homomorphic signatures and message authentication codes. In: Abdalla, M., De Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 514–519. Springer, Heidelberg (2014)

    Google Scholar 

  3. Demirel, D., Derler, D., Hanser, C., Pöhls, H.C., Slamanig, D., Traverso, G.: PRISMACLOUD D4.4: overview of functional and malleable signature schemes. Technical report, H2020 Prismacloud (2015). www.prismacloud.eu

  4. European commission: European cloud computing strategy “unleashing the potential of cloud computing in Europe” (2012). http://ec.europa.eu/digital-agenda/en/european-cloud-computing-strategy. Accessed 31 March 2015

  5. Ghernaouti, S.: Cyber Power - Crime, Conflict and Security in Cyberspace. EPFL Press, Burlington (2013)

    Book  Google Scholar 

  6. Groß, T.: Signatures and efficient proofs on committed graphs and NP-statements. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 293–314. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  7. Lorünser, T., Happe, A., Slamanig, D.: ARCHISTAR: towards secure and robust cloud based data sharing. In: IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015, Vancouver, 30 November–3 December 2015. IEEE (2015)

    Google Scholar 

  8. Meyerson, A., Williams, R.: On the complexity of optimal \(k\)-anonymity. In: Symposium on Principles of Database Systems, PODS 2004, New York, USA (2004)

    Google Scholar 

  9. Müller-Quade, J., Unruh, D.: Long-term security and universal composability. J. Crypt. 23(4), 594–671 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  10. PRWeb: a cloud computing forecast summary for 2013–2017 from IDC, gartner and KPMG, citing a study by accenture (2013). http://www.prweb.com/releases/2013/11/prweb11341594.htm. Accessed 31 March 2015

  11. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  12. Slamanig, D., Hanser, C.: On cloud storage and the cloud of clouds approach. In: ICITST-2012, pp. 649–655. IEEE Press (2012)

    Google Scholar 

  13. Sweeney, L.: \(k\)-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  14. Transparency market research: cloud computing services market - global industry size, share, trends, analysis and forecasts 2012–2018 (2012). http://www.transparencymarketresearch.com/cloud-computing-services-market.html. Accessed 31 March 2015

  15. Walfish, M., Blumberg, A.J.: Verifying computations without reexecuting them. Commun. ACM 58(2), 74–84 (2015)

    Article  Google Scholar 

  16. Wästlund, E., Angulo, J., Fischer-Hübner, S.: Evoking comprehensive mental models of anonymous credentials. In: iNetSeC, pp. 1–14 (2011)

    Google Scholar 

  17. Weiss, M., Rozenberg, B., Barham, M.: Practical solutions for format-preserving encryption. CoRR abs/1506.04113 (2015). http://arxiv.org/abs/1506.04113

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Lorünser .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Lorünser, T., Länger, T., Slamanig, D. (2015). Cloud Security and Privacy by Design. In: Katsikas, S., Sideridis, A. (eds) E-Democracy – Citizen Rights in the World of the New Computing Paradigms. e-Democracy 2015. Communications in Computer and Information Science, vol 570. Springer, Cham. https://doi.org/10.1007/978-3-319-27164-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27164-4_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27163-7

  • Online ISBN: 978-3-319-27164-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics