A Secure Dynamic Collaboration Environment in a Cloud Context

Chris Piechotta, Adam Enø Jensen, Martin Grooss Olsen, Joey W. Coleman, Peter Gorm Larsen

2013

Abstract

In recent years, the cloud has emerged as an attractive means for hosting and delivering services over the Internet. This has resulted in a renewed focus on information security in the case where data is stored in the virtual space of the cloud and is not physically accessible to the customer. This paper addresses the increasing security concerns of migrating to the cloud and utilising it for data storage, focusing on securing data in an untrusted cloud environment and ensuring detailed data access control in the cloud.

References

  1. Ateniese, G., Fu, K., Green, M., and Hohenberger, S. (2006). Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9:1-30.
  2. Bellare, M., Boldyreva, A., and O'Neill, A. (2007). Deterministic and efficiently searchable encryption. In Proceedings of the 27th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO'07, pages 535-552, Berlin, Heidelberg. Springer-Verlag.
  3. Blaze, M., Bleumer, G., and Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In Nyberg, K., editor, Advances in Cryptology - EUROCRYPT'98, volume 1403 of Lecture Notes in Computer Science, pages 127-144. Springer Berlin / Heidelberg.
  4. Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Persiano, G. (2004). Public key encryption with keyword search. In Cachin, C. and Camenisch, J., editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 506-522. Springer Berlin / Heidelberg.
  5. Dong, C., Russello, G., and Dulay, N. (2008). Shared and searchable encrypted data for untrusted servers. In Atluri, V., editor, Data and Applications Security XXII, volume 5094 of Lecture Notes in Computer Science, pages 127-143. Springer Berlin / Heidelberg.
  6. Dong, C., Russello, G., and Dulay, N. (2011). Shared and searchable encrypted data for untrusted servers. J. Comput. Secur., 19:367-397.
  7. Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., and Chandramouli, R. (2001). Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur., 4(3):224-274.
  8. Kamara, S. and Lauter, K. (2010). Cryptographic cloud storage. Financial Cryptography and Data Security, pages 136-149.
  9. Kamara, S., Papamanthou, C., and Roeder, T. (2011). CS2: A semantic cryptographic cloud storage system. Technical report, Technical Report MSR-TR2011-58, Microsoft Research, 2011. http://research. microsoft. com/apps/pubs. Accessed Apr 19 2012.
  10. Kocher, P. (1996). Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Koblitz, N., editor, Advances in Cryptology - CRYPTO 7896, volume 1109 of Lecture Notes in Computer Science, pages 104-113. Springer Berlin / Heidelberg.
  11. Mather, T., Kumaraswamy, S., and Latif, S. (2009). Cloud security and privacy: an enterprise perspective on risks and compliance. O'Reilly Media, Inc.
  12. Piechotta, C., Jensen, A. E., and Olsen, M. G. (2012). Secure dynamic cloud-based collaboration with hierarchical access. Master's thesis, Aarhus University. Published as technical report ECE-TR-8.
  13. Ruj, S., Nayak, A., and Stojmenovic, I. (2011). DACC: Distributed access control in clouds. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on, pages 91 -98.
  14. Schaffer, H. (2009). X as a service, cloud computing, and the need for good judgment. IT Professional, 11(5):4- 5.
  15. Simmons, G. J. (1979). Symmetric and asymmetric encryption. ACM Comput. Surv., 11(4):305-330.
  16. Yu, S., Wang, C., Ren, K., and Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1-9. IEEE.
  17. Zhao, F., Nishide, T., and Sakurai, K. (2011). Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems. In Bao, F. and Weng, J., editors, Information Security Practice and Experience, volume 6672 of Lecture Notes in Computer Science, pages 83-97. Springer Berlin / Heidelberg.
  18. Zhou, M., Zhang, R., Xie, W., Qian, W., and Zhou, A. (2010). Security and privacy in cloud computing: A survey. In Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on, pages 105- 112.
Download


Paper Citation


in Harvard Style

Piechotta C., Jensen A., Olsen M., Coleman J. and Larsen P. (2013). A Secure Dynamic Collaboration Environment in a Cloud Context . In Proceedings of the 3rd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-8565-52-5, pages 406-415. DOI: 10.5220/0004357004060415


in Bibtex Style

@conference{closer13,
author={Chris Piechotta and Adam Enø Jensen and Martin Grooss Olsen and Joey W. Coleman and Peter Gorm Larsen},
title={A Secure Dynamic Collaboration Environment in a Cloud Context},
booktitle={Proceedings of the 3rd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2013},
pages={406-415},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004357004060415},
isbn={978-989-8565-52-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - A Secure Dynamic Collaboration Environment in a Cloud Context
SN - 978-989-8565-52-5
AU - Piechotta C.
AU - Jensen A.
AU - Olsen M.
AU - Coleman J.
AU - Larsen P.
PY - 2013
SP - 406
EP - 415
DO - 10.5220/0004357004060415