Information Technology Reference
In-Depth Information
security also involves other aspects, for example, virtualization security,
not addressed here.
There are many security challenges that need to be addressed.
3.5.1 Security in Mobile Clouds
Most of the cryptographic techniques are computation intensive. This might
not be a good option for mobile devices, which are energy constrained.
So,  efficient encryption and decryption protocols need to be devised to
enable security on mobile devices. One way is to outsource some of the
encryption and decryption operations to a third party or a proxy server.
3.5.2 Distributed Data Auditing for Clouds
In most of the related work on data auditing, the auditor is assumed to be
a trusted party. However, this is a strong assumption. Thus, distributed
auditing looks attractive. This will make the auditing process more robust.
Assigning all auditing jobs to one TTP can also slow the whole system. Thus,
a distributed auditing service not only will balance the load but also will
provide trustworthy service. Users with idle resources can contribute toward
distributed data auditing.
3.5.3 Secure Multiparty Computation on Clouds
Secure multiparty computation is a cryptographic paradigm in which n users
compute a function securely, keeping their inputs private. The users send
their inputs in such a way that only the function can be computed, without
knowing the individual input. These computations are extremely involved
and are good candidates for computation on clouds. However, a single server
is prone to single-point failure. For this reason, distributed computing on
clouds is an attractive option. Secure multiparty computation in clouds is a
promising area of research.
References
1. Secure shell protocol. http://tools.ietf.org/html/rfc4252.
2. Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea
Kissner, Zachary N. J. Peterson, and Dawn Xiaodong Song. Provable data
possession at untrusted stores. In Peng Ning, Sabrina De Capitani di Vimercati,
and Paul F. Syverson, editors, ACM Conference on Computer and Communications
Security , pages 598-609. New York: ACM, 2007.
3. Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik.
Scalable and efficient provable data possession. IACR Cryptology ePrint Archive ,
2008:114, 2008.
Search WWH ::




Custom Search