Faster Secure Cloud Computations with a Trusted Proxy

被引:2
|
作者
Drucker, Nir [1 ,2 ]
Gueron, Shay [1 ,2 ]
Pinkas, Benny [3 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Amazon Web Serv, Seattle, WA USA
[3] Bar Ilan Univ, Ramat Gan, Israel
基金
以色列科学基金会;
关键词
cloud computing; security; trusted proxy;
D O I
10.1109/MSP.2017.4251121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing infrastructures offer many advantages to users, including large storage and high computation power. However, offloading workloads to hosting environments raises trust and privacy concerns. Algorithms that address these concerns require multiple network transactions and have low performance.
引用
收藏
页码:61 / 67
页数:7
相关论文
共 50 条
  • [1] Secure and Trusted Cloud of Things
    Bhattasali, Tapalina
    Chaki, Rituparna
    Chaki, Nabendu
    [J]. 2013 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2013,
  • [2] On Secure Outsourcing of Cryptographic Computations to Cloud
    Kuppusamy, Lakshmi
    Rangasamy, Jothi
    Gauravaram, Praveen
    [J]. SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 63 - 67
  • [3] Special issue on Trusted Cloud-Edges Computations
    Ardagna, Claudio A.
    Conti, Mauro
    Yu, Chia-Mu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 112 : 1180 - 1183
  • [4] Special issue on Trusted Cloud-Edges Computations
    Ardagna, Claudio A.
    Conti, Mauro
    Yu, Chia-Mu
    [J]. Future Generation Computer Systems, 2020, 112 : 1180 - 1183
  • [5] Trusted Platforms to secure Mobile Cloud Computing
    Thinh Le Vinh
    Bouzefrane, Samia
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1068 - 1075
  • [6] Editorial: Special issue on trusted Cloud-Edges computations
    Ardagna, Claudio A.
    Conti, Mauro
    Damiani, Ernesto
    Yu, Chia-Mu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 114 : 661 - 664
  • [7] Practical and Secure Outsourcing of Matrix Computations to the Cloud
    Nassar, Mohamed
    Erradi, Abdelkarim
    Malluhi, Qutaibah M.
    [J]. 2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 70 - 75
  • [8] Trusted secure model for data services in cloud computing
    [J]. Xu, Zheng-Quan, 1600, Editorial Board of Journal on Communications (35):
  • [9] MrCrypt: Static Analysis for Secure Cloud Computations
    Tetali, Sai Deep
    Lesani, Mohsen
    Majumdar, Rupak
    Millstein, Todd
    [J]. ACM SIGPLAN NOTICES, 2013, 48 (10) : 271 - 286
  • [10] Secure Streaming Forensic Data Transmission for Trusted Cloud
    Liu, Anyi
    Liu, Jigang
    Uehara, Tetsutaro
    [J]. SFCS'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY AND FORENSICS IN COMMUNICATION SYSTEMS, 2014, : 3 - 10