Vis enkel innførsel

dc.contributor.authorBoyd, Colin Alexander
dc.contributor.authorDavies, Gareth Thomas
dc.contributor.authorGjøsteen, Kristian
dc.contributor.authorRaddum, Håvard
dc.contributor.authorToorani, Mohsen
dc.date.accessioned2019-04-15T09:40:10Z
dc.date.available2019-04-15T09:40:10Z
dc.date.created2018-08-13T09:46:42Z
dc.date.issued2018
dc.identifier.citationLecture Notes in Computer Science. 2018, 11192 LNCS 347-365.nb_NO
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/11250/2594624
dc.description.abstractCloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, yet it is not obvious what security properties are required for such encryption. Furthermore, cloud storage providers often use techniques such as data deduplication for improving efficiency which restricts the application of semantically-secure encryption. Generic security goals and attack models have thus far proved elusive: primitives are considered in isolation and protocols are often proved secure under ad hoc models for restricted classes of adversaries. We formally model natural security notions for cloud storage and deduplication using a generic syntax for storage systems. We define security notions for confidentiality and integrity in encrypted cloud storage and determine relations between these notions. We show how to build cloud storage systems that satisfy our defined security notions using standard cryptographic components.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer, Chamnb_NO
dc.titleSecurity notions for cloud storage and deduplicationnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber347-365nb_NO
dc.source.volume11192 LNCSnb_NO
dc.source.journalLecture Notes in Computer Sciencenb_NO
dc.identifier.doi10.1007/978-3-030-01446-9_20
dc.identifier.cristin1601383
dc.relation.projectNorges forskningsråd: 248166nb_NO
dc.description.localcodeThe final authenticated version is available online at https://doi.org/10.1007/978-3-030-01446-9_20nb_NO
cristin.unitcode194,63,30,0
cristin.unitcode194,63,15,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.unitnameInstitutt for matematiske fag
cristin.ispublishedtrue
cristin.fulltextpreprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel