Privacy supporting cloud computing: ConfiChair, a case study

25Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Cloud computing means entrusting data to information systems that are managed by external parties on remote servers, in the "cloud", raising new privacy and confidentiality concerns. We propose a general technique for designing cloud services that allows the cloud to see only encrypted data, while still allowing it to perform data-dependent computations. The technique is based on key translations and mixes in web browsers. We focus on the particular cloud computing application of conference management. We identify the specific security and privacy risks that existing systems like EasyChair and EDAS pose, and address them with a protocol underlying ConfiChair, a novel cloud-based conference management system that offers strong security and privacy guarantees. In ConfiChair, authors, reviewers, and the conference chair interact through their browsers with the cloud, to perform the usual tasks of uploading and downloading papers and reviews. In contrast with current systems, in ConfiChair the cloud provider does not have access to the content of papers and reviews and the scores given by reviewers, and moreover is unable to link authors with reviewers of their paper. We express the ConfiChair protocol and its properties in the language of ProVerif, and prove that it does provide the intended properties. © 2012 Springer-Verlag.

References Powered by Scopus

Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility

4641Citations
N/AReaders
Get full text

Fully Homomorphic Encryption Using Ideal Lattices

4608Citations
N/AReaders
Get full text

Ciphertext-policy attribute-based encryption

4519Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Enhanced Certificate Transparency and End-to-end Encrypted Mail

110Citations
N/AReaders
Get full text

Deciding equivalence-based properties using constraint solving

37Citations
N/AReaders
Get full text

A conference management system with verified document confidentiality

30Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Arapinis, M., Bursuc, S., & Ryan, M. (2012). Privacy supporting cloud computing: ConfiChair, a case study. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7215 LNCS, pp. 89–108). https://doi.org/10.1007/978-3-642-28641-4_6

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 15

71%

Researcher 3

14%

Professor / Associate Prof. 2

10%

Lecturer / Post doc 1

5%

Readers' Discipline

Tooltip

Computer Science 22

88%

Engineering 2

8%

Economics, Econometrics and Finance 1

4%

Save time finding and organizing research with Mendeley

Sign up for free