scispace - formally typeset
Open AccessJournal ArticleDOI

Cloud computing security

Mark Ryan
- 01 Sep 2013 - 
- Vol. 86, Iss: 9, pp 2263-2268
Reads0
Chats0
TLDR
A method in which in-browser key translation allows a software-as-a-service application to run with confidentiality from the service provider to survey approaches to protecting data from a cloud infrastructure provider.
About
This article is published in Journal of Systems and Software.The article was published on 2013-09-01 and is currently open access. It has received 381 citations till now. The article focuses on the topics: Cloud computing security & Cloud computing.

read more

Citations
More filters
Journal ArticleDOI

Security in cloud computing

TL;DR: The security issues that arise due to the very nature of cloud computing are detailed and the recent solutions presented in the literature to counter the security issues are presented.
Journal ArticleDOI

Security issues in cloud environments: a survey

TL;DR: This paper surveys the works on cloud security issues, making a comprehensive review of the literature on the subject and proposes a taxonomy for their classification, addressing several key topics, namely vulnerabilities, threats, and attacks.
Journal ArticleDOI

Cloud Computing Security: A Survey

TL;DR: This work identifies cloud vulnerabilities, classify known security threats and attacks, and presents the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks.
Book ChapterDOI

Security and Privacy Issues in Cloud Computing

TL;DR: This chapter describes various service and deployment models of cloud computing and identifies major challenges, including three critical challenges: regulatory, security and privacy issues in cloud computing.
Journal ArticleDOI

A survey on security challenges in cloud computing: issues, threats, and solutions

TL;DR: This work aims to analyze the different components of cloud computing as well as present security and privacy problems that these systems face, and presents new classification of recent security solutions that exist in this area.
References
More filters
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Book ChapterDOI

Fully homomorphic encryption with relatively small key and ciphertext sizes

TL;DR: This work presents a fully homomorphic encryption scheme which has both relatively small key and ciphertext size and allows efficient fully homomorphism over any field of characteristic two.
Proceedings ArticleDOI

Flicker: an execution infrastructure for tcb minimization

TL;DR: Flicker is presented, an infrastructure for executing security-sensitive code in complete isolation while trusting as few as 250 lines of additional code, and can provide meaningful, fine-grained attestation of the code executed (as well as its inputs and outputs) to a remote party.
Proceedings ArticleDOI

TrustVisor: Efficient TCB Reduction and Attestation

TL;DR: TrustVisor is presented, a special-purpose hypervisor that provides code integrity as well as data integrity and secrecy for selected portions of an application that has a very small code base that makes verification feasible.
Related Papers (5)
Frequently Asked Questions (10)
Q1. What are the contributions mentioned in the paper "Cloud computing security: the scientific challenge, and a survey of solutions" ?

The fact that data is shared with the cloud service provider is identified as the core scientific problem that separates cloud computing security from other topics in computing security. In many ways, it also enhances security: the cloud provider may be able to afford to invest in better and more up-todate security technologies and practices than the data owner can. However, since cloud computing necessarily puts data outside of the control of the data owner, it inevitably introduces security issues too. 3. Data in the cloud is vulnerable to being lost ( e. g., accidentally deleted ) or incorrectly modified by the cloud provider. 2. Cloud-based data is usually intentionally widely accessible by potentially insecure protocols and APIs across public networks. 

The multi-tenancy aspect is addressed by deploying strong virtual machine managers and operating systems that ensure separation between processes; that was always their purpose. 

The main achievement of Flicker is to reduce the size of the trusted computing base (TCB)—that is, the program that has to be trusted (in addition to p)—to about 250 lines of code. 

Systems such as EasyChair and EDAS allow a conference chair or manager to create the conference account “in the cloud”, and those systems handle all the necessary administration such as distribution of papers to programme committee (PC) members, collection and distribution of reviews and discussion, and production of emails to authors and reviewers and reports such as acceptance statistics and the conference programme. 

The privacy concerns with cloud-computing-based conference management systems such as EDAS and EasyChair arise because the system administrators are custodians of a huge quantity of data about the submission and reviewing behaviour of thousands of researchers, aggregated across multiple conferences. 

when the process manager needs to make this data available to reviewers, s/he downloads the data keys, decrypts them using the private key, and encrypts them again using a symmetric key that has been shared by an out-of-band protocol with the evaluators, and then uploads them again. 

This VM can be securely provisioned with a symmetric key (for disk storage) and the secret part of a public key (for TLS communication) by a conference chair at the time the conference account is created. 

This downloading, decryption, encryption and uploading can take place automatically by the web browser being used by the manager. 

Key translation in the browser is so far restricted to a rather narrow class of applications, which roughly may be characterised as “store-and-forward”. 

There are several ways to leverage hardware-anchored security on the cloud side to achieve confidentiality for the conference management data.