Abstract
Cloud computing infrastructures offer many advantages to users, including large storage and high computation power. However, offloading workloads to hosting environments raises trust and privacy concerns. Algorithms that address these concerns require multiple network transactions and have low performance.
Original language | English |
---|---|
Article number | 8123460 |
Pages (from-to) | 61-67 |
Number of pages | 7 |
Journal | IEEE Security and Privacy |
Volume | 15 |
Issue number | 6 |
DOIs | |
State | Published - 1 Nov 2017 |
Bibliographical note
Funding Information:This research was supported by the Blavatnik Interdisciplinary Cyber Research Center at Tel Aviv University, the PQCRYPTO project, which is partially funded by the European Commission Horizon 2020 research programme (grant 645622); the Israel Science Foundation (grant 1018/16); the Israel Ministry of Science and Technology (grant 3-10883), and the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office.
Publisher Copyright:
© 2003-2012 IEEE.
Keywords
- cloud computing
- security
- trusted proxy
ASJC Scopus subject areas
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Law