Editorial
Cloud computing security and privacy: Standards and regulations

https://doi.org/10.1016/j.csi.2017.03.005Get rights and content

Abstract

Cloud computing is a distributed computation model over a large pool of shared and virtualized computing resources, such as storage, processing power, applications and services. It has received considerable attention from the research communities and the industry due to its practicality This kind of new computing represents a vision of providing computing services as public utilities like water and electricity. Cloud computing provides a number of benefits, including reduced IT costs, flexibility, increased collaboration, etc. However, the advent of cloud computing has posed a variety of new challenges for both cloud users and cloud service providers. Taking data privacy as an example, encryption is becoming a standard practice for both cloud users and cloud service providers, as a mechanism against unauthorized surveillance as well as malware. However, the introduction of encryption to cloud also leads to new problems such as key management, as well as the inability of cloud to provide some utilities such as data manipulation. Providing cloud as utilities is an active research area of interest, which includes how these encrypted data can be searched, shared or used as input for computation directly.

Section snippets

This Special Issue

We are pleased to present 8 technical papers dealing with cutting-edge research and technology related to this topic. These papers were selected out of the significantly extended versions of the 60 submissions from 23 countries in the 9th International Conference on Provable Security (ProvSec., 2015) and 39 open submissions. These papers have been rigorously reviewed and only the best papers were selected.

In the first paper entitled “Pairing-based CP-ABE with constant-size ciphertexts and

References (8)

  • V. Odelu, A. Kumar Das, Y.S. Rao, S. Kumari, M. Khurram Khan and K. Choo, “Pairing-based CP-ABE with constant-size...
  • H. Liu, Y. Mu, J. Zhao, C. Xu, H. Wang, L. Chen and Y. Yu, “Identity-Based Provable Data Possession Revisited: Security...
  • G. Han, Y. Yu, X. Li, K. Chen and H. Li, “Characterizing the semantics of passwords: The role of Pinyin for Chinese...
  • W. Ren, R. Liu, M. Lei and K. Choo, “SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented...
There are more references available in the full text version of this article.

Cited by (24)

  • Blockchain-based verifiable privacy-preserving data classification protocol for medical data

    2022, Computer Standards and Interfaces
    Citation Excerpt :

    With the development of the Internet-of-things [1,2], a large number of IoT devices are connected to the internet.1

  • A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA

    2022, Computer Standards and Interfaces
    Citation Excerpt :

    Moreover, the cloud server can take users data without their permission and use it for financial purposes. Therefore, the data must be encrypted before being outsourced to the untrusted cloud server to maintain data security and privacy [9–14]. However, it can be challenging for users to search for what the user wants to examine without disclosing any information related to actual data stored in the cloud storage.

  • Identity-based outsider anonymous cloud data outsourcing with simultaneous individual transmission for IoT environment

    2021, Journal of Information Security and Applications
    Citation Excerpt :

    Although it is easy to realize the communication mode of the outsider anonymous cloud data outsourcing system through the policy-hiding attribute-based data outsourcing system, the concept of identity-based OAnoDOSIT is an independent interest in which the outsider anonymity of the consumer set with any number of simultaneous personalized transmission are at primary concern. Over the last decade, extensive development has been performed in the design and analysis of various cloud computing systems, heading to a broad family of schemes [2,7,9,11,14,17,18,35]. However, we require further deployment of cloud data outsourcing systems that simultaneously: (1) enjoy compact communication and computation costs that are highly desirable for the IoT enabled light-weight devices, (2) realize Identity-Based Encryption (IBE) framework that can accommodate exponential number of consumers, (3) allow data owner to simultaneously transmit encrypted common data for a group of subscribed consumers along with the personalized data for individual consumers of the group and (4) can achieve outsider anonymity of the authorized consumers.

  • Optimal defense of a distributed data storage system against hackers’ attacks

    2020, Reliability Engineering and System Safety
    Citation Excerpt :

    With the rapid development of big data and cloud computing technology, distributed data storage systems have received considerable research attention in recent years [1–3].

  • Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

    2018, Journal of Network and Computer Applications
    Citation Excerpt :

    Cloud-aided WBANs can improve the quality of health-care services by supporting access to a wide range of resources, which better meet the basic requirements of real-time monitoring and tele-medicine basic demands. The open wireless network environment makes the application of WBANs face many security risks and threats (Huang et al., 2017), and the advent of cloud computing also presents a number of security challenges for cloud users and application providers (Yong et al., 2017; Verma and Kaushal, 2016; Shen et al., 2017b; Fu et al., 2015). Among them, the main concern of the user is the protection of the privacy and users need to verify that the cloud server has stored their data securely (Shen et al., 2017c; Li et al., 2015).

View all citing articles on Scopus
View full text