Encryption and fragmentation for data confidentiality in the cloud

25Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing has emerged as a successful paradigm allowing individual users as well as companies to resort to external providers for storing/processing data or making them available to others. Together with the many benefits, cloud computing introduces however new security and privacy risks. A major issue is that the data owner, storing data at external providers, loses control over them, leaving them potentially exposed to improper access, use, or dissemination. In this chapter, we consider the problem of protecting confidentiality of sensitive information when relying on external cloud providers for storing and processing data. We introduce confidentiality requirements and then illustrate encryption and data fragmentation as possible protection techniques. In particular, we discuss different approaches that have been proposed using encryption (with indexing) and fragmentation, either by themselves or in combination, to satisfy confidentiality requirements.

Cite

CITATION STYLE

APA

De Capitani Di Vimercati, S., Erbacher, R. F., Foresti, S., Jajodia, S., Livraga, G., & Samarati, P. (2014). Encryption and fragmentation for data confidentiality in the cloud. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8604, pp. 212–243). Springer Verlag. https://doi.org/10.1007/978-3-319-10082-1_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free