Skip to main content
Top
Published in: e & i Elektrotechnik und Informationstechnik 7/2017

18-09-2017 | Originalarbeit

Agile cryptographic solutions for the cloud

Authors: Thomas Lorünser, Stephan Krenn, Christoph Striecks, Thomas Länger

Published in: e+i Elektrotechnik und Informationstechnik | Issue 7/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing, with its estimated market size of 150 billion USD annual turnover, is one of the major growth areas in information and communication technologies today. As a paradigm building on outsourcing of storage and processing, cloud computing suffers from intrinsic security and privacy problems. However, cryptographic research has made substantial progress over the last years and today provides a portfolio of mature cryptographic primitives and protocols suitable for addressing several of these problems in an effective and efficient way. Nevertheless, today’s reality shows that there exists a gap between what is possible and what is actually available in the cloud. We will present a detailed analysis of inhibitors and roadblocks standing in the way of an extensive deployment of cryptographic protection to cloud services, and how organizational and procedural measures may support the practical deployment of cryptography. We conclude our article with an overview of novel cryptographic schemes and their potential for protection of end-user data during storage and processing in the cloud, once they will become widely available.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
Literature
1.
go back to reference Almeida, J. B., Bangerter, E., Barbosa, M., Krenn, S., Sadeghi, A.-R., Schneider, T. (2010): A certifying compiler for zero-knowledge proofs of knowledge based on sigma-protocols. In ESORICS (pp. 151–167). Almeida, J. B., Bangerter, E., Barbosa, M., Krenn, S., Sadeghi, A.-R., Schneider, T. (2010): A certifying compiler for zero-knowledge proofs of knowledge based on sigma-protocols. In ESORICS (pp. 151–167).
2.
go back to reference Almeida, J. B., Barbosa, M., Bangerter, E., Barthe, G., Krenn, S., Zanella Béguelin, S. (2012): Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols. In ACM CCS (pp. 488–500). Almeida, J. B., Barbosa, M., Bangerter, E., Barthe, G., Krenn, S., Zanella Béguelin, S. (2012): Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols. In ACM CCS (pp. 488–500).
3.
go back to reference Ateniese, G., Chou, D. H., de Medeiros, B., Tsudik, G. (2005): Sanitizable signatures. In ESORICS (pp. 159–177). Ateniese, G., Chou, D. H., de Medeiros, B., Tsudik, G. (2005): Sanitizable signatures. In ESORICS (pp. 159–177).
4.
go back to reference Blakley, G. R. (1979): Safeguarding cryptographic keys. In Proceedings of the national computer conference (Vol. 48, pp. 313–317). Blakley, G. R. (1979): Safeguarding cryptographic keys. In Proceedings of the national computer conference (Vol. 48, pp. 313–317).
5.
go back to reference Blaze, M., Bleumer, G., Strauss, M. (1998): Divertible protocols and atomic proxy cryptography. In EUROCRYPT (pp. 127–144). Blaze, M., Bleumer, G., Strauss, M. (1998): Divertible protocols and atomic proxy cryptography. In EUROCRYPT (pp. 127–144).
6.
go back to reference Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G. L., Neven, G., Pedersen, M. Ø. (2015): Formal treatment of privacy-enhancing credential systems. In SAC (pp. 3–24). Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G. L., Neven, G., Pedersen, M. Ø. (2015): Formal treatment of privacy-enhancing credential systems. In SAC (pp. 3–24).
8.
go back to reference Goyal, V., Pandey, O., Sahai, A., Waters, B. (2006): Attribute-based encryption for fine-grained access control of encrypted data. In ACM CCS (pp. 89–98). Goyal, V., Pandey, O., Sahai, A., Waters, B. (2006): Attribute-based encryption for fine-grained access control of encrypted data. In ACM CCS (pp. 89–98).
10.
go back to reference Johnson, R., Molnar, D., Song, D., Wagner, D. (2002): Homomorphic signature schemes. In CT-RSA (pp. 244–262). Johnson, R., Molnar, D., Song, D., Wagner, D. (2002): Homomorphic signature schemes. In CT-RSA (pp. 244–262).
11.
go back to reference Krenn, S., Lorünser, T., Striecks, C. (2017) Batch-verifiable secret sharing with unconditional privacy. In ICISSP (pp. 303–311). Krenn, S., Lorünser, T., Striecks, C. (2017) Batch-verifiable secret sharing with unconditional privacy. In ICISSP (pp. 303–311).
12.
go back to reference Lorünser, T., Slamanig, D., Länger, T., Pöhls, H. C. (2016): PRISMACLOUD tools: a cryptographic toolbox for increasing security in cloud services. In ARES (pp. 733–741). Lorünser, T., Slamanig, D., Länger, T., Pöhls, H. C. (2016): PRISMACLOUD tools: a cryptographic toolbox for increasing security in cloud services. In ARES (pp. 733–741).
13.
go back to reference Lorünser, T., Happe, A., Slamanig, S. (2015): ARCHISTAR: towards secure and robust cloud based data sharing. In: CloudCom (pp. 371–378). Lorünser, T., Happe, A., Slamanig, S. (2015): ARCHISTAR: towards secure and robust cloud based data sharing. In: CloudCom (pp. 371–378).
14.
go back to reference Länger, T., Pöhls, H. C., Ghernaouti, S. (2016): Selected cloud security patterns to improve end user security and privacy in public clouds. In Proceedings of the ENISA Annual Privacy Forum 2016, LNCS vol. 9858. Berlin: Springer (pp. 115–132). Länger, T., Pöhls, H. C., Ghernaouti, S. (2016): Selected cloud security patterns to improve end user security and privacy in public clouds. In Proceedings of the ENISA Annual Privacy Forum 2016, LNCS vol. 9858. Berlin: Springer (pp. 115–132).
15.
go back to reference Rogaway, P. The moral character of cryptographic work. Cryptology ePrint archive, report 2015/1162. 2015. Rogaway, P. The moral character of cryptographic work. Cryptology ePrint archive, report 2015/1162. 2015.
Metadata
Title
Agile cryptographic solutions for the cloud
Authors
Thomas Lorünser
Stephan Krenn
Christoph Striecks
Thomas Länger
Publication date
18-09-2017
Publisher
Springer Vienna
Published in
e+i Elektrotechnik und Informationstechnik / Issue 7/2017
Print ISSN: 0932-383X
Electronic ISSN: 1613-7620
DOI
https://doi.org/10.1007/s00502-017-0519-x

Other articles of this Issue 7/2017

e & i Elektrotechnik und Informationstechnik 7/2017 Go to the issue