Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
How to withstand mobile virus attacks (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Fast Approximation Algorithms for the Knapsack and Sum of Subset Problems
Journal of the ACM (JACM)
Communications of the ACM
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Understanding churn in peer-to-peer networks
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
Exploiting social networks for threshold signing: attack-resilience vs. availability
Proceedings of the 2008 ACM symposium on Information, computer and communications security
On monotone formula closure of SZK
SFCS '94 Proceedings of the 35th Annual Symposium on Foundations of Computer Science
Scalable and efficient provable data possession
Proceedings of the 4th international conference on Security and privacy in communication netowrks
PeerSoN: P2P social networking: early experiences and insights
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
Privacy-enabling social networking over untrusted networks
Proceedings of the 2nd ACM workshop on Online social networks
Privacy, cost, and availability tradeoffs in decentralized OSNs
Proceedings of the 2nd ACM workshop on Online social networks
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Privacy preserving social networking through decentralization
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
A case for P2P infrastructure for social networks - opportunities & challenges
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Security for the cloud infrastructure: trusted virtual data center implementation
IBM Journal of Research and Development
Nebulas: using distributed voluntary resources to build clouds
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
Towards trusted cloud computing
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
The case for enterprise-ready virtual private clouds
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
SocialClouds: concept, security architecture and some mechanisms
INTRUST'09 Proceedings of the First international conference on Trusted Systems
SocialClouds: concept, security architecture and some mechanisms
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Hi-index | 0.00 |
Cloud computing is an emerging paradigm of computing. In the past, two types of cloud computing systems have been discussed, PublicClouds (i.e., vendors making revenue by offering cloud computing services to the public) and PrivateClouds (i.e., enterprises' datacenters serving their own needs but not to the public). In this paper, we envision a third type of cloud computing systems, called SocialClouds. In a SocialCloud, the computing platforms (including hardware, software, and applications) are induced by trust-based social relationships (e.g., the platforms are contributed by a large population of people who are nodes/vertices in a trust- or friendship-based, possibly implicit, social network). We discuss the security challenges posed by SocialClouds, and present a security architecture. We further elaborate on the access control component of the security architecture, and advocate an instantiation through a cryptographic architecture we call CryptoOverlay. To illustrate the utility of this concept, we also propose two CryptoOverlay primitives, called assembly signature and identification schemes.