Capability-based Cryptographic Data Access Control in Cloud Computing

Chittaranjan Hota, Sunil Sanka Department of Computer Science & Information Systems, BITS Pilani Hyderabad Campus, Hyderabad Email: hota@bits-hyderabad.ac.in, sunil.grt@gmail.com Muttukrishnan Rajarajan Information Security Group, School of Engineering & Mathematical Sciences, City University, London Email: r.muttukrishnan@city.ac.uk Srijith K. Nair Security Futures Practice, BT Innovate and Design, British Telecommunications, Suffolk IP5 3RE, UK Email: srijith.nair@bt.com

[1]  Bharat K. Bhargava,et al.  Secure and efficient access to outsourced data , 2009, CCSW '09.

[2]  Lakshmi Sobhana Kalli,et al.  Market-Oriented Cloud Computing : Vision , Hype , and Reality for Delivering IT Services as Computing , 2013 .

[3]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[4]  Sushil Jajodia,et al.  Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.

[5]  Sushil Jajodia,et al.  A data outsourcing architecture combining cryptography and access control , 2007, CSAW '07.

[6]  Avishai Wool,et al.  Toward securing untrusted storage without public-key operations , 2005, StorageSS '05.

[7]  Qin Zhou,et al.  A PKI-based mechanism for secure and efficient access to outsourced data , 2010, 2010 International Conference on Networking and Digital Society.

[8]  Robert S. Fabry,et al.  Capability-based addressing , 1974, CACM.

[9]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[10]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[11]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[12]  Dan Suciu,et al.  Controlling Access to Published Data Using Cryptography , 2003, VLDB.

[13]  Mukesh Singhal,et al.  Advanced Concepts In Operating Systems , 1994 .

[14]  Chris Rose,et al.  A Break in the Clouds: Towards a Cloud Definition , 2011 .

[15]  L. Youseff,et al.  Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.

[16]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[17]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[18]  Hovav Shacham,et al.  SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.