Proceedings of the 2nd International Workshop on Security in Cloud Computing 2014
DOI: 10.1145/2600075.2600082
|View full text |Cite
|
Sign up to set email alerts
|

Domain based storage protection with secure access control for the cloud

Abstract: Cloud computing has evolved from a promising concept to one of the fastest growing segments of the IT industry. However, many businesses and individuals continue to view cloud computing as a technology that risks exposing their data to unauthorized users. We introduce a data confidentiality and integrity protection mechanism for Infrastructure-asa-Service (IaaS) clouds, which relies on trusted computing principles to provide transparent storage isolation between IaaS clients. We also address the absence of rel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
1

Relationship

6
2

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 13 publications
0
16
0
Order By: Relevance
“…Threat Model Similar to existing works in the area [34,37], we assume a semi-honest cloud provider. In the semi-honest adversarial model, a malicious cloud provider correctly follows the protocol specification.…”
Section: Threat Model Secure Storage and Query Middlewarementioning
confidence: 99%
“…Threat Model Similar to existing works in the area [34,37], we assume a semi-honest cloud provider. In the semi-honest adversarial model, a malicious cloud provider correctly follows the protocol specification.…”
Section: Threat Model Secure Storage and Query Middlewarementioning
confidence: 99%
“…Cloud middleware creates the cloud infrastructure abstraction by weaving the available resources into a single platform. In our system model we consider a cloud computing environment based on a trusted IaaS provider like the one described in [11]. The IaaS platform consists of cloud hosts which operate virtual machine guests and communicate through a network.…”
Section: System Model and Problem Statementmentioning
confidence: 99%
“…We consider a cloud computing environment based on a trusted IaaS provider like the one described in [14] and [15]. The IaaS platform consists of cloud hosts which operate virtual machine guests and communicate through a network.…”
Section: Cloud Service Provider (Csp)mentioning
confidence: 99%