International audience; This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-B... View more
 P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology, vol. 53, no. 6, p. 50, 2009. [Online]. Available: http://csrc.nist. gov/groups/SNS/cloud-computing/cloud-def-v15.doc
 D. Chappell, “Introducing the Windows azure platform,” October, vol. 30, no. October, p. 2010, 2010. [Online]. Available: http://download.microsoft.com/download/C/0/ 2/C02C4D26-0472-4688AC13-199EA321135E/Introduce_ Azure_Services_Platform_1_2.pdf
 S. Kamara and K. Lauter, “Cryptographic cloud storage,” in Proceedings of the 14th international conference on Financial cryptograpy and data security, ser. FC'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 136-149. [Online]. Available: http: //dl.acm.org/citation.cfm?id=1894863.1894876
 R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, “Controlling data in the cloud: outsourcing computation without outsourcing control,” in Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009, pp. 85-90.
 D. Ratna, B. Rana, and S. Palash, “Pairing-based cryptographic protocols : A survey,” 2004, http://eprint.iacr.org/.
 A. Shamir, “Identity-based cryptosystems and signature schemes,” in Proceedings of CRYPTO 84 on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1985, pp. 47-53.
 D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2003.
 I. Blake, G. Seroussi, N. Smart, and J. W. S. Cassels, Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series). New York, NY, USA: Cambridge University Press, 2005.
 D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, ser. CRYPTO '01. London, UK, UK: Springer-Verlag, 2001, pp. 213-229. [Online]. Available: http://dl.acm.org/citation.cfm?id=646766.704155