2010
DOI: 10.1007/978-3-642-13869-0_30
|View full text |Cite
|
Sign up to set email alerts
|

Token-Based Cloud Computing

Abstract: Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifiable encryption, recently proposed, are promising but suffer from very high latency. Other proposals perform the whole computation on tamper-proof hardware and usually suffer from the the same problem. Trusted computing (TC) is another promising approach that uses trusted software and hardware components on computing platforms to provi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
27
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 87 publications
(28 citation statements)
references
References 17 publications
0
27
0
Order By: Relevance
“…Kubiatowicz et al [19] explain structural design for encrypted determined storage during Cloud called OceanStore; Sadeghi et al [20] explain a procedure throughout usage of a tamper-proof hardware token. This method applies toward a cloud service supplier which is base scheduled trust compute platform.…”
Section: Background Knowledgementioning
confidence: 99%
“…Kubiatowicz et al [19] explain structural design for encrypted determined storage during Cloud called OceanStore; Sadeghi et al [20] explain a procedure throughout usage of a tamper-proof hardware token. This method applies toward a cloud service supplier which is base scheduled trust compute platform.…”
Section: Background Knowledgementioning
confidence: 99%
“…Authentication for cloud and traditional web environment is widely adopted the use of Identity Based Authentication [5], R.A. Popa et.al [13] and many other devoted frameworks [7] which uses security key to allow users verify their identity to the authentication server according to their security requirements. However, this architecture is not ready for deployment in practical applications yet access control in traditional web applications and Cloud services is different from cloud environment usage.…”
Section: Related Workmentioning
confidence: 99%
“…Some generic technological solutions have appeared in the literature. The first one uses trusted hardware tokens [38], in which some trusted hardware performs the computations (such as key translations) that involve sensitive data. Solutions based on trusted hardware tokens may work, but appear to have significant scalability issues, and require much more research.…”
Section: Related Workmentioning
confidence: 99%
“…Expressing secrecy properties as equivalences is quite standard and is used in hundreds of papers, for example in [6,14,15,24,38]. There is no particular aspect of the system we analyse which makes it less suitable to this kind of analysis than those other systems.…”
Section: Appendix: Response To Reviewersmentioning
confidence: 99%