Information Technology Reference
In-Depth Information
3
Securing Cl oud Data
Sushmita Ruj and Rajat Saxena
CONTENTS
Summary ................................................................................................................ 42
3.1 Introduction .................................................................................................. 42
3.1.1 Organization of the Chapter .......................................................... 43
3.2 Homomorphic Encryption for Secure Computation in the Cloud ....... 43
3.2.1 Paillier Homomorphic Encryption Scheme ................................. 44
3.2.2 Bilinear Pairing ................................................................................ 45
3.2.3 Homomorphic Encryption Using Bilinear Pairings ................... 45
3.2.4 Fully Homomorphic Encryption ................................................... 47
3.3 Fine-Grained Access Control ..................................................................... 47
3.3.1 Attribute-Based Encryption ........................................................... 48
3.3.2 Ciphertext-Policy Attribute-Based Encryption ........................... 49
3.3.3 Distributed Access Control in Clouds .......................................... 51
3.4 Data Auditing ............................................................................................... 55
3.4.1 Provable Data Possession Techniques .......................................... 57
3.4.2 Rank-Based Skip Lists ..................................................................... 58
3.4.3 Skip List Verification ....................................................................... 60
3.4.4 Bilinear Aggregate Signatures ....................................................... 61
3.4.4.1 BLS Signature Scheme ...................................................... 61
3.4.4.2 Aggregate Signature Scheme .......................................... 61
3.4.5 Data Auditing Using Aggregate Signatures ................................ 62
3.4.6 Third-Party Auditing of Cloud Data ............................................ 63
3.4.7 Proof-of-Retrievability Schemes .................................................... 64
3.5 Conclusion and Future Work ..................................................................... 67
3.5.1 Security in Mobile Clouds .............................................................. 68
3.5.2 Distributed Data Auditing for Clouds .......................................... 68
3.5.3 Secure Multiparty Computation on Clouds ................................ 68
References ............................................................................................................... 68
41
Search WWH ::




Custom Search