2017
DOI: 10.1109/tcc.2016.2525991
|View full text |Cite
|
Sign up to set email alerts
|

Providing User Security Guarantees in Public Infrastructure Clouds

Abstract: obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The WestminsterResearch online digital archive at the University of Westminster aims to make the research output of the University available to a wider audience. Copyright and Moral Rights remain with the authors and/o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3
1

Relationship

6
3

Authors

Journals

citations
Cited by 63 publications
(42 citation statements)
references
References 29 publications
(40 reference statements)
0
42
0
Order By: Relevance
“…This upgrade will allow MemTri to effectively locate evidence in the context of any specified criminal investigation, thus making it practical for use in a real-life environment. In addition to that, we plan to integrate our tool in a trusted cloud environment such as the one presented in [20,21,32,33] and allow users from different geographical locations to enhance the dictionary based on their experience. Finally, adding a weight on each of the existing words has the potential to improve the effectiveness of our tool since it will be easier for a digital investigator to identify real criminal activities and categorize them by their importance.…”
Section: Resultsmentioning
confidence: 99%
“…This upgrade will allow MemTri to effectively locate evidence in the context of any specified criminal investigation, thus making it practical for use in a real-life environment. In addition to that, we plan to integrate our tool in a trusted cloud environment such as the one presented in [20,21,32,33] and allow users from different geographical locations to enhance the dictionary based on their experience. Finally, adding a weight on each of the existing words has the potential to improve the effectiveness of our tool since it will be easier for a digital investigator to identify real criminal activities and categorize them by their importance.…”
Section: Resultsmentioning
confidence: 99%
“…The data distribution and encryption algorithms are also important aspects towards trusted cloud services [35] and applications. In [15], C. Gentry presented the first fully homomorphic encryption scheme that enables semantically secure outsourcing to the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…In [4] authors presented DBSP -a framework for data and operation security in Infrastructure-as-a-Service (IaaS) clouds, consisting of protocols for a trusted launch of virtual machines and domain-based storage protection. Its security guarantees are supported by an extensive theoretical analysis with proofs about protocol resistance against attacks in the defined threat model.…”
Section: Related Workmentioning
confidence: 99%
“…A summary of the notation introduced so far is presented in Table I. V. THREAT MODEL Our threat model is similar with the one described in [4], which is based on the Dolev-Yao adversarial model [14] and further assumes that privileged access rights can used by a remote adversary ADV to leak confidential information. ADV , e.g.…”
Section: Definition 1 (Revocable Key-policy Abe)mentioning
confidence: 99%