2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012
DOI: 10.1109/trustcom.2012.261
|View full text |Cite
|
Sign up to set email alerts
|

Self-Protecting Documents for Cloud Storage Security

Abstract: Information security is currently one of the most important issues in information systems. This concerns the confidentiality of information but also its integrity and availability. The problem becomes even more difficult when several companies are working together on a project and that the various documents "go out of" their respective information systems. We propose an architecture in which the documents themselves ensure their security and thus can be exchanged over uncontrolled resources such as cloud stora… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…However, this is often much infeasible due to the very fact that an external entity cannot be trusted at hand over the private data of users. Therefore, SMC is all concerning finding appropriate cryptographic protocols which will replace the use of a TTP, to hold out a certain user intended function whereas ensuring data privacy of users [4]. The term cloud will be seen as a sweetening done to the net in terms of hardware virtualization and resource sharing.…”
Section: Fundamental Of Smcmentioning
confidence: 99%
“…However, this is often much infeasible due to the very fact that an external entity cannot be trusted at hand over the private data of users. Therefore, SMC is all concerning finding appropriate cryptographic protocols which will replace the use of a TTP, to hold out a certain user intended function whereas ensuring data privacy of users [4]. The term cloud will be seen as a sweetening done to the net in terms of hardware virtualization and resource sharing.…”
Section: Fundamental Of Smcmentioning
confidence: 99%
“…Munier et al [16] designed and implemented self-protecting documents for cloud storage, where autonomic documents encapsulate data as well as additional information such as access and usage control, traceability and metadata information, or collaborative work management. This solution is specifically meant for cloud services and document sharing, it allows protecting groups of files.…”
Section: Context-aware Solutionsmentioning
confidence: 99%
“…In [76], the authors proposed an architecture for self-protecting documents by encapsulating security components like access control and usage control for achieving automatic document architecture for enterprise Digital Rights Management [e-DRM].…”
Section: Security Issues Related To Auditing Regulatory Compliance Amentioning
confidence: 99%