Abstract
In this paper we identify some areas where cryptography can help a rapid adoption of cloud computing. Although secure storage has already captured the attention of many cloud providers, offering a higher level of protection for their customer’s data, we think that more advanced techniques such as searchable encryption and secure outsourced computation will become popular in the near future, opening the doors of the Cloud to customers with higher security requirements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yao, A.C.-C.: How to generate and exchange secrets. In: Foundations of Computer Science (FOCS 1986), pp. 162–167 (1986)
van Dijk, M., Juels, A.: On the impossibility of cryptography alone for privacy-preserving cloud computing. In: Hot Topics in Security (HotSec 2010), pp. 1–8. USENIX Association (2010)
Gentry, C., Halevi, S.: Implementing Gentry’s fully-homomorphic encryption scheme. Cryptology ePrint Archive, Report 2010/520 (2010), http://eprint.iacr.org/2010/520
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005)
Smart, N., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 420–443. Springer, Heidelberg (2010)
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010)
Bugiel, S., Nurnberger, S., Sadeghi, A.R., Schneide, T.: Twin Clouds: An Architecture for Secure Cloud Computing. In: Workshop on Cryptography and Security in Clouds, Zurich, March 15-16 (2011)
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998)
Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: Proceedings of 38th Annual Symposium on Foundations of Computer Science, pp. 364–373 (1997)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 21st Symp. on Security and Privacy (S&P), Berkeley, California, pp. 44–55. IEEE Computer Society, Los Alamitos (2000)
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 79–88 (2006)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Di Crescenzo, G., Saraswat, V.: Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 282–296. Springer, Heidelberg (2007)
Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: ASIACCS, pp. 376–379. ACM, New York (2009)
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)
Jeffery, K., Neidecker-Lutz, B.: The Future Of Cloud Computing, Opportunities For European Cloud Computing Beyond (2010), http://cordis.europa.eu/fp7/ict/ssai/docs/cloud-report-final.pdf
Chen, Y., Paxson, V., Katz, R.H.: What’s New About Cloud Computing Security? Technical Report No. UCB/EECS-2010-5, (January 20, 2010), http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html
RSA, The Role of Security in Trustworthy Cloud Computing
Oladimeji, E.A.: Security threat Modeling and Analysis: A goal-oriented approach (2006)
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds (2009)
Shamir, A.: How to share a secret. Commun. ACM, 612–613 (1979)
Plank, J.S., Luo, J., Schuman, C.D., Xu, L., Wilcox-O’Hearn, Z.: A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage (2009)
Galiero, G., Giammatteo, G.: Trusting third-party storage providers for holding personal information. A Context-based Approach to Protect Identity-related Data in Untrusted Domains, Identity in the Information Society 2(2), 99–114
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Agudo, I., Nuñez, D., Giammatteo, G., Rizomiliotis, P., Lambrinoudakis, C. (2011). Cryptography Goes to the Cloud. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-22365-5_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22364-8
Online ISBN: 978-3-642-22365-5
eBook Packages: Computer ScienceComputer Science (R0)