Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

The state of public infrastructure-as-a-service cloud security

W Huang, A Ganjali, BH Kim, S Oh, D Lie - ACM Computing Surveys …, 2015 - dl.acm.org
The public Infrastructure-as-a-Service (IaaS) cloud industry has reached a critical mass in
the past few years, with many cloud service providers fielding competing services. Despite …

Efficient attribute-based encryption with attribute revocation for assured data deletion

L Xue, Y Yu, Y Li, MH Au, X Du, B Yang - Information Sciences, 2019 - Elsevier
Cloud storage allows customers to store their data on remote cloud servers. With the
advantage of reducing the burden of data management and storage, an increasing number …

Outsourced proofs of retrievability

F Armknecht, JM Bohli, GO Karame, Z Liu… - Proceedings of the 2014 …, 2014 - dl.acm.org
Proofs of Retrievability (POR) are cryptographic proofs that enable a cloud provider to prove
that a user can retrieve his file in its entirety. POR need to be frequently executed by the user …

Cryptographic solutions for cloud storage: Challenges and research opportunities

L Zhang, H Xiong, Q Huang, J Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
While cloud computing is relatively mature and its potential benefits well understood by
individual, industry and government consumers, a number of security and privacy concerns …

Multiauthority attribute-based encryption for assuring data deletion

J Li, R Zhang, Y Lu, J Han, Y Zhang… - IEEE Systems …, 2022 - ieeexplore.ieee.org
In order to alleviate key escrow issue, the notion of multiauthority attribute-based encryption
(MA-ABE) was presented, which was widely applied in cloud storage environment. In data …

Verifying cloud services: present and future

S Bouchenak, G Chockler, H Chockler… - ACM SIGOPS operating …, 2013 - dl.acm.org
As cloud-based services gain popularity in both private and enterprise domains, cloud
consumers are still lacking in tools to verify that these services work as expected. Such tools …

Mirror: Enabling proofs of data replication and retrievability in the cloud

F Armknecht, L Barman, JM Bohli… - 25th USENIX security …, 2016 - usenix.org
Proofs of Retrievability (POR) and Data Possession (PDP) are cryptographic protocols that
enable a cloud provider to prove that data is correctly stored in the cloud. PDP have been …

Poreps: Proofs of space on useful data

B Fisch - Cryptology ePrint Archive, 2018 - eprint.iacr.org
A proof-of-replication (PoRep) is an interactive proof system in which a prover defends a
publicly verifiable claim that it is dedicating unique resources to storing one or more …

[PDF][PDF] Scaling proof-of-replication for filecoin mining

B Fisch, J Bonneau, N Greco… - Report. Protocol Labs …, 2018 - research.protocol.ai
A proof-of-replication (PoRep) is a proof system that a server can use to demonstrate to a
network in a publicly verifiable way that it is dedicating unique resources to storing one or …