Back to Search Start Over

Cloud computing, security and data concealment

Authors :
Michel Riveill
Karima Boudaoud
Christian Delettre
Laboratoire d'Informatique, Signaux, et Systèmes de Sophia-Antipolis (I3S) / Equipe RAINBOW
Scalable and Pervasive softwARe and Knowledge Systems (Laboratoire I3S - SPARKS)
Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S)
Université Nice Sophia Antipolis (... - 2019) (UNS)
COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (... - 2019) (UNS)
COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S)
COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)
Source :
IEEE Symposium on Computers and Communications (ISCC), 2011, IEEE Symposium on Computers and Communications (ISCC), 2011, Jun 2011, Corfu, Greece. pp.424-431, ⟨10.1109/ISCC.2011.5983874⟩, ISCC
Publication Year :
2011
Publisher :
HAL CCSD, 2011.

Abstract

International audience; Cloud computing is a new paradigm providing software and hardware resources according to the customers' needs. However, it introduces new security risks such as confidentiality of data stored in cloud databases. Actually, this last risk is a crucial issue that must be addressed as ciphering mechanisms are not sufficient to guarantee a strong confidentiality of data. In this paper, we discuss the main cloud computing security risks and focus on the data confidentiality problem in the context of e-commerce clouds. We describe the design of a data concealment component that we propose to resolve this problem. Evaluating this component, we find that it successfully conceal data of legitimate users and protect them against potential attacks.

Details

Language :
English
Database :
OpenAIRE
Journal :
IEEE Symposium on Computers and Communications (ISCC), 2011, IEEE Symposium on Computers and Communications (ISCC), 2011, Jun 2011, Corfu, Greece. pp.424-431, ⟨10.1109/ISCC.2011.5983874⟩, ISCC
Accession number :
edsair.doi.dedup.....8ab82f1208121daa2b005c3b30d3110b
Full Text :
https://doi.org/10.1109/ISCC.2011.5983874⟩