Back to Search
Start Over
Cloud computing, security and data concealment
- Source :
- IEEE Symposium on Computers and Communications (ISCC), 2011, IEEE Symposium on Computers and Communications (ISCC), 2011, Jun 2011, Corfu, Greece. pp.424-431, ⟨10.1109/ISCC.2011.5983874⟩, ISCC
- Publication Year :
- 2011
- Publisher :
- HAL CCSD, 2011.
-
Abstract
- International audience; Cloud computing is a new paradigm providing software and hardware resources according to the customers' needs. However, it introduces new security risks such as confidentiality of data stored in cloud databases. Actually, this last risk is a crucial issue that must be addressed as ciphering mechanisms are not sufficient to guarantee a strong confidentiality of data. In this paper, we discuss the main cloud computing security risks and focus on the data confidentiality problem in the context of e-commerce clouds. We describe the design of a data concealment component that we propose to resolve this problem. Evaluating this component, we find that it successfully conceal data of legitimate users and protect them against potential attacks.
- Subjects :
- Focus (computing)
Cloud computing security
Computer science
business.industry
020206 networking & telecommunications
Context (language use)
Cloud computing
02 engineering and technology
E-commerce
Computer security
computer.software_genre
[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing
[INFO.INFO-MC]Computer Science [cs]/Mobile Computing
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Software
020204 information systems
Component (UML)
0202 electrical engineering, electronic engineering, information engineering
Confidentiality
business
computer
Subjects
Details
- Language :
- English
- Database :
- OpenAIRE
- Journal :
- IEEE Symposium on Computers and Communications (ISCC), 2011, IEEE Symposium on Computers and Communications (ISCC), 2011, Jun 2011, Corfu, Greece. pp.424-431, ⟨10.1109/ISCC.2011.5983874⟩, ISCC
- Accession number :
- edsair.doi.dedup.....8ab82f1208121daa2b005c3b30d3110b
- Full Text :
- https://doi.org/10.1109/ISCC.2011.5983874⟩