Proceedings of the CUBE International Information Technology Conference 2012
DOI: 10.1145/2381716.2381822
|View full text |Cite
|
Sign up to set email alerts
|

Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computing

Abstract: Cloud computing is a novel pattern of computing where resources are provisioned on demand over the Internet. Being pay-as-yougo model, Cloud users lease the required resources and pay for their usage. Services offered by Cloud are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-aService (PaaS) and Software-as-a-Service (SaaS). IaaS provides computing resources such as servers, storage, and other form of low level network and hardware resources. One of the widely used serv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…New techniques such as Provable Data Possession (PDP) in untrusted cloud may be a more efficient mechanism as it generates a probabilistic proof for data integrity based on only a small portion of the file [18]. If users' data are very sensitive than CSP have to use complex encryption algorithm (example Blowfish, AES, DES with variant key size etc) [11]. The key management can be done through common PKI infrastructure.…”
Section: Solutions Of Some Issuesmentioning
confidence: 99%
“…New techniques such as Provable Data Possession (PDP) in untrusted cloud may be a more efficient mechanism as it generates a probabilistic proof for data integrity based on only a small portion of the file [18]. If users' data are very sensitive than CSP have to use complex encryption algorithm (example Blowfish, AES, DES with variant key size etc) [11]. The key management can be done through common PKI infrastructure.…”
Section: Solutions Of Some Issuesmentioning
confidence: 99%