A cryptographic file system for UNIX
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Communications of the ACM
The Design and Implementation of a Transparent Cryptographic File System for UNIX
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
Pors: proofs of retrievability for large files
Proceedings of the 14th ACM conference on Computer and communications security
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
POTSHARDS: secure long-term storage without encryption
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Scalable and efficient provable data possession
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Dynamic provable data possession
Proceedings of the 16th ACM conference on Computer and communications security
Proofs of retrievability: theory and implementation
Proceedings of the 2009 ACM workshop on Cloud computing security
Secure and efficient access to outsourced data
Proceedings of the 2009 ACM workshop on Cloud computing security
On protecting integrity and confidentiality of cryptographic file system for outsourced storage
Proceedings of the 2009 ACM workshop on Cloud computing security
Cryptographic primitives enforcing communication and storage complexity
FC'02 Proceedings of the 6th international conference on Financial cryptography
Enabling public verifiability and data dynamics for storage security in cloud computing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Secure cloud storage: available infrastructures and architectures review and evaluation
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Hi-index | 0.00 |
Over the last years Cloud Computing has been seen as an emerging technology, which has changed the way computing services are delivered. Cloud computing is not a new technology paradigm, but rather introduces a new way of delivering computing services and resources. On top of its potential value and the several advantages it offers, we can foresee a number of drawbacks of cloud computing, in terms of security and privacy issues. In specific, cloud computing raises the level of expertise needed to protect security and privacy of its stakeholders (i.e. organizations and end-users), mainly due to the fact that the massive concentration of computer resources and data could be a more attractive target to malicious users. In this paper, we present a cloud provider-agnostic model for outsourcing both static and dynamic data to third parties, while preserving their confidentiality and integrity. In addition to a detailed presentation of our model, we also depict an evaluation of it, in terms of its capabilities and weaknesses.