scispace - formally typeset
Patent

Verifiable trust for data through wrapper composition

Reads0
Chats0
TLDR
A digital escrow pattern for data services can include selective access for obscured data at a remote site or in a cloud service, distributing trust across multiple entities to avoid a single point of data compromise.
Abstract
A digital escrow pattern for data services can include selective access for obscured data at a remote site or in a cloud service, distributing trust across multiple entities to avoid a single point of data compromise. Based on the pattern, a "trustworthy envelope" for any kind of payload enables curtained access through a variety of decorations or seals placed on the envelope that allow for a gamut of trust ranging with guarantees such as, but not limited to, confidentiality, privacy, anonymity, tamper detection, integrity, etc. Verifiable trust is provided through families of techniques that are referred to as wrapper composition. Multiple concentric and/or lateral transform wrappers or layers can wholly or partially transform data, metadata or both to mathematical transform (e.g., encrypt, distribute across storage, obscure) or otherwise introduce lack of visibility to some or all of the data, metadata or both.

read more

Citations
More filters
Patent

System and method for decentralized title recordation and authentication

TL;DR: In this article, a decentralized property system and method allow ownership rights to be transferred directly from one party to another without requiring a central authority to operate or secure the system, using a blockchain algorithm, distributed consensus on asset ownership can be achieved.
Patent

Containerless data for trustworthy computing and data services

TL;DR: In this paper, a digital escrow pattern and trustworthy platform is provided for data services including mathematical transformation techniques, such as searchable encryption techniques, for obscuring data stored at remote site or in a cloud service, distributing trust across multiple entities to avoid a single point of data compromise.
Patent

Method and apparatus for providing access control to shared data based on trust level

TL;DR: In this paper, an approach for providing access control to shared data based on a trust level is provided, comprising, encrypting, at a first device, data with public attribute keys associated with attributes according to an attribute-based encryption (ABE) scheme, wherein the attributes comprising at least one trust level related attribute representing an access condition for the data, and storing the encrypted data into a data center, determining the eligibility of a user of a second device by checking whether a trust-level of the user of the second device satisfies the access condition.
Patent

Trustworthy extensible markup language for trustworthy computing and data services

TL;DR: A digital escrow pattern for data services can include selective access for obscured data at a remote site or in a cloud service, distributing trust across multiple entities to avoid a single point of data compromise as mentioned in this paper.
Patent

Tracing with a workload distributor

TL;DR: In this article, a load balanced system may incorporate instrumented systems within a group of managed devices and distribute workload among the devices to meet both load balancing and data collection, and authentication may be performed between the authenticated devices and the workload distributor to verify that the managed devices are able to receive the workloads.
References
More filters
Journal Article

Above the Clouds: A Berkeley View of Cloud Computing

TL;DR: This work focuses on SaaS Providers (Cloud Users) and Cloud Providers, which have received less attention than SAAS Users, and uses the term Private Cloud to refer to internal datacenters of a business or other organization, not made available to the general public.
Patent

Distributed computing services platform

TL;DR: In this paper, a server federation cooperatively interacts to fulfill service requests by communicating using data structures that follow a schema in which the meaning of the communicated data is implied by the schema.
Patent

Secure streaming container

TL;DR: In this article, a system and method for securely streaming encrypted digital media content out of a digital container to a user's media player was proposed, which makes unauthorized copying of the digital content contained in the digital container virtually impossible.
Proceedings ArticleDOI

Controlling data in the cloud: outsourcing computation without outsourcing control

TL;DR: It is argued that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today.
Book ChapterDOI

Secure Conjunctive Keyword Search over Encrypted Data

TL;DR: The setting in which a user stores encrypted documents on an untrusted server is studied, in order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents.