Article ID Journal Published Year Pages File Type
10343140 Journal of Systems and Software 2013 24 Pages PDF
Abstract
► We survey approaches to protecting data from a cloud infrastructure provider. ► We explain some difficulties with using fully homomorphic encryption for cloud computing applications. ► We describe a method in which in-browser key translation allows a software-as-a-service application to run with confidentiality from the service provider. ► We explore how trusted hardware can be used to protect cloud-based data.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
,