A blueprint for introducing disruptive technology into the Internet
ACM SIGCOMM Computer Communication Review
Tahoe: the least-authority filesystem
Proceedings of the 4th ACM international workshop on Storage security and survivability
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Modeling architecture for collaborative virtual objects based on services
Journal of Network and Computer Applications
A new agent based security framework for collaborative cloud environment
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Hi-index | 0.00 |
"Cloud Computing" offers many potential benefits, including cost savings, the ability to deploy applications and services quickly, and the ease of scaling those application and services once they are deployed. A key barrier for enterprise adoption is the confidentiality of data stored on Cloud Computing Infrastructure. Our simple technique implemented with Open Source software solves this problem by using public key encryption to render stored data at rest unreadable by unauthorized personnel, including system administrators of the cloud computing service on which the data is stored. We validate our approach on a network measurement system implemented on PlanetLab. We then use it on a service where confidentiality is critical --- a scanning application that validates external firewall implementations.