Faster Secure Cloud Computations with a Trusted Proxy

Nir Drucker, Shay Gueron, Benny Pinkas

Research output: Contribution to journalArticlepeer-review

Abstract

Cloud computing infrastructures offer many advantages to users, including large storage and high computation power. However, offloading workloads to hosting environments raises trust and privacy concerns. Algorithms that address these concerns require multiple network transactions and have low performance.

Original languageEnglish
Article number8123460
Pages (from-to)61-67
Number of pages7
JournalIEEE Security and Privacy
Volume15
Issue number6
DOIs
StatePublished - 1 Nov 2017

Bibliographical note

Funding Information:
This research was supported by the Blavatnik Interdisciplinary Cyber Research Center at Tel Aviv University, the PQCRYPTO project, which is partially funded by the European Commission Horizon 2020 research programme (grant 645622); the Israel Science Foundation (grant 1018/16); the Israel Ministry of Science and Technology (grant 3-10883), and the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office.

Publisher Copyright:
© 2003-2012 IEEE.

Keywords

  • cloud computing
  • security
  • trusted proxy

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Law

Fingerprint

Dive into the research topics of 'Faster Secure Cloud Computations with a Trusted Proxy'. Together they form a unique fingerprint.

Cite this