ID based cryptography for secure cloud data storage

Conference object English OPEN
Kaaniche, Nesrine; Boudguiga, Aymen; Laurent, Maryline;
(2013)
  • Publisher: IEEE
  • Related identifiers: doi: 10.1109/CLOUD.2013.80
  • Subject: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] | ID-based cryptography | Cloud storage | Privacy | [ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]

International audience; This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-B... View more
  • References (26)
    26 references, page 1 of 3

    [1] P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology, vol. 53, no. 6, p. 50, 2009. [Online]. Available: http://csrc.nist. gov/groups/SNS/cloud-computing/cloud-def-v15.doc

    [2] D. Chappell, “Introducing the Windows azure platform,” October, vol. 30, no. October, p. 2010, 2010. [Online]. Available: http://download.microsoft.com/download/C/0/ 2/C02C4D26-0472-4688AC13-199EA321135E/Introduce_ Azure_Services_Platform_1_2.pdf

    [3] Amazon, “Amazon simple storage service (amazon s3).” [Online]. Available: http://aws.amazon.com/s3/

    [4] S. Kamara and K. Lauter, “Cryptographic cloud storage,” in Proceedings of the 14th international conference on Financial cryptograpy and data security, ser. FC'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 136-149. [Online]. Available: http: //dl.acm.org/citation.cfm?id=1894863.1894876

    [5] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, “Controlling data in the cloud: outsourcing computation without outsourcing control,” in Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009, pp. 85-90.

    [6] D. Ratna, B. Rana, and S. Palash, “Pairing-based cryptographic protocols : A survey,” 2004, http://eprint.iacr.org/.

    [7] A. Shamir, “Identity-based cryptosystems and signature schemes,” in Proceedings of CRYPTO 84 on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1985, pp. 47-53.

    [8] D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2003.

    [9] I. Blake, G. Seroussi, N. Smart, and J. W. S. Cassels, Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series). New York, NY, USA: Cambridge University Press, 2005.

    [10] D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, ser. CRYPTO '01. London, UK, UK: Springer-Verlag, 2001, pp. 213-229. [Online]. Available: http://dl.acm.org/citation.cfm?id=646766.704155

  • Metrics
Share - Bookmark