Cryptography in the Cloud: Advances and Challenges

  • Boyd C
N/ACitations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

[Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.]

Cite

CITATION STYLE

APA

Boyd, C. (2013). Cryptography in the Cloud: Advances and Challenges. Journal of Information and Communication Convergence Engineering, 11(1), 17–23. https://doi.org/10.6109/jicce.2013.11.1.017

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free