Favored Encryption Techniques for Cloud Storage

被引:4
作者
Song, Chungsik [1 ]
Park, Younghee [1 ]
Gao, Jerry [1 ]
Nanduri, Sri Kinnera [1 ]
Zegers, William [1 ]
机构
[1] San Jose State Univ, Dept Comp Engn, San Jose, CA 95192 USA
来源
2015 IEEE FIRST INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (BIGDATASERVICE 2015) | 2015年
关键词
Cryptography; Key management; Cloud Computing; Big data security; FULLY HOMOMORPHIC ENCRYPTION; KEY; SEARCHES; SECURITY;
D O I
10.1109/BigDataService.2015.75
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Data has been often offloaded to the cloud for high accessibility due to the advanced cloud infrastructure. However, we often ignore the safety of our data and completely rely on the cloud service provider. Data protection and encryption are the most important foundations in order to construct reliable and secure cloud environments. Recently, a lot of industries have used and developed various data encryption techniques that would be a fundamental solution to achieve data protection. This paper investigates current encryption and key management techniques used by the industry. We evaluate the popular techniques to find the elements that affect system performance. Finally, we compare various encryption techniques and suggest future directions for high performance and scalable encryption techniques.
引用
收藏
页码:267 / 274
页数:8
相关论文
共 43 条
  • [1] Agrawal R., 2004, P ACM SIGMOD INT C M, P563
  • [2] [Anonymous], 2003, CRYPTOLOGY EPRINT AR
  • [3] [Anonymous], MITCSAILTR2011005 MI
  • [4] [Anonymous], 1997, ELLIPTIC CURVES CRYP
  • [5] [Anonymous], 2012, ADV CRYPTOLOGY CRYPT
  • [6] Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
  • [7] Boldyreva A, 2011, LECT NOTES COMPUT SC, V6841, P578, DOI 10.1007/978-3-642-22792-9_33
  • [8] Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
  • [9] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [10] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615