Engineering Cryptography for Security and Privacy in the Cloud

被引:0
|
作者
Krenn, Stephan [1 ]
Loruenser, Thomas [1 ]
Striecks, Christoph [1 ]
机构
[1] AIT Austrian Inst Technol GmbH, Vienna, Austria
来源
ERCIM NEWS | 2018年 / 113期
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A large body of research in cryptography was established over recent decades but little of it has been commercialised. This is to the detriment of cloud computing, where the new methods would help to establish end-to-end security, which is not yet common practice.
引用
收藏
页码:53 / 54
页数:2
相关论文
共 50 条
  • [41] A Study on Quantum Cryptography Based Security Management in Cloud
    Raina, Priya
    Kaushal, Sakshi
    6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015), 2015, : 350 - 354
  • [42] Designing of Cryptography Based Security System for Cloud Computing
    Sengupta, Nandita
    Holmes, Jeffrey
    2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 52 - 57
  • [43] Threshold Cryptography Based Data Security in Cloud Computing
    Saroj, Sushil Kr
    Chauhan, Sanjeev Kr
    Sharma, Aravendra Kr
    Vats, Sundaram
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207
  • [44] The Strategy of Cryptography for the Proposed Model of Security in Cloud Computing
    Hyseni, Dhurate
    Selimi, Besnik
    Luma, Artan
    Cico, Betim
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 24 - 28
  • [45] Comparative study of cryptography for cloud computing for data security
    Mathur P.
    Gupta A.K.
    Vashishtha P.
    Recent Advances in Computer Science and Communications, 2021, 14 (05) : 1508 - 1513
  • [46] Cloud Server Security using Bio-Cryptography
    Khalid, Zarnab
    Rizwan, Muhammad
    Shabbir, Aysha
    Shabbir, Maryam
    Ahmad, Fahad
    Manzoor, Jaweria
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (03) : 166 - 172
  • [47] Cryptography A security pillar of privacy, integrity and authenticity of data communication
    Kapoor, Bhushan
    Pandya, Pramod
    Sherif, Joseph S.
    KYBERNETES, 2011, 40 (9-10) : 1422 - 1439
  • [48] Security and Privacy for Medical Images Using Chaotic Visual Cryptography
    Abdul, Wadood
    Ali, Zulfiqar
    Ghouzali, Sanaa
    Alsulaiman, Mansour
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2017, 7 (06) : 1296 - 1301
  • [49] Do you want to know a secret? Cryptography, privacy and security
    Kalfatovic, MR
    INFORMATION TECHNOLOGY AND LIBRARIES, 1997, 16 (03) : VII - VIII
  • [50] Cloud Security and Privacy Model for Providing Secure Cloud Services
    El Makkaoui, Khalid
    Ezzati, Abdellah
    Beni-Hssane, Abderrahim
    Motamed, Cina
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 81 - 86