Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. It builds on the foundations of distributed computing, grid computing, virtualization, service orientation, etc. Cloud computing offers numerous benefits from both the technology and functionality perspectives such as increased availability, flexibility, and functionality. However, this new paradigm also brings many security and privacy issues such as secure remote storage, outsourcing computation and secure virtualization. All these security and privacy issues should be carefully studied and solved before the wide deployment of cloud computing. We are pleased to present to you ten papers dealing with advanced research and technology on the security in cloud computing. These papers are selected following a rigorous process with the help of reviewers around the globe. They addressed the security and privacy issues in cloud computing and presented solutions for these problems. One of security issues in cloud computing is how to outsource data to potentially untrusted cloud servers. It also usually incurs huge computation overhead. In the paper entitled ‘‘Server-aided Anonymous Attribute-based Authentication in Cloud Computing’’ [1], Liu et al. proposed an efficient and secure outsourcing algorithm of ABS to address the above challenging issue. To protect and share the personal health records stored in cloud, in the paper entitled ‘‘Secure Sharing of Personal Health Records in Cloud Computing: Ciphertext-Policy Attribute Based Signcryption’’ [2], Liu et al. proposed a new approach achieving fine-grained access control of data by using the ciphertext-policy attribute based signcryption (CP-ABSC). Availability of cloud data is another important security requirement in cloud computing. In the paper ‘‘Remote Data Possession Checking with Enhanced Security for Cloud Storage’’ [3], Yu et al. presented an improved scheme to fix the security flaws of the original protocol which is vulnerable to replay attack and deletion attack launched by a dishonest server. To guarantee that users’ files are available and stored in some specified cloud servers, a novel challenge-and-response technique was presented in the paper ‘‘Towards Secure and Reliable Cloud Storage against Data Re-outsourcing’’ [4] by Jiang et al. Cloud data sharing is another important research topic in cloud computing. The paper entitled ‘‘A Secure and Efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing’’ [5] by Liang et al. proposed a new ciphertextpolicy attribute based proxy re-encryption (CP-ABPRE) to tackle the problem by integrating the dual system encryption technology with selective proof technique. Zhuang et al. proposed an information theoretical secure verifiable secret sharing (VSS)
[1]
Xiaofeng Chen,et al.
Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing
,
2015,
Future Gener. Comput. Syst..
[2]
Joseph K. Liu,et al.
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
,
2015,
Future Gener. Comput. Syst..
[3]
Yong Yu,et al.
Remote data possession checking with enhanced security for cloud storage
,
2015,
Future Gener. Comput. Syst..
[4]
Li Xu,et al.
A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing
,
2015,
Future Gener. Comput. Syst..
[5]
Jie Zhang,et al.
Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications
,
2015,
Future Gener. Comput. Syst..
[6]
Joseph K. Liu,et al.
Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption
,
2015,
Future Gener. Comput. Syst..
[7]
Hui Li,et al.
A design for cloud-assisted Fair-Play Management System of online contests with provable security
,
2015,
Future Gener. Comput. Syst..
[8]
Tao Jiang,et al.
Towards secure and reliable cloud storage against data re-outsourcing
,
2015,
Future Gener. Comput. Syst..
[9]
Hongyang Yan,et al.
Server-aided anonymous attribute-based authentication in cloud computing
,
2015,
Future Gener. Comput. Syst..
[10]
Meikang Qiu,et al.
Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure
,
2015,
Future Gener. Comput. Syst..