This Article 
 Bibliographic References 
 Add to: 
Cloud Data Protection for the Masses
January 2012 (vol. 45 no. 1)
pp. 39-45
Dawn Song, University of California, Berkeley
Elaine Shi, University of California, Berkeley
Ian Fischer, University of California, Berkeley
Umesh Shankar, Google
Offering strong data protection to cloud users while enabling rich applications is a challenging task. Researchers explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.

1. C. Dwork, "The Differential Privacy Frontier Extended Abstract," Proc. 6th Theory of Cryptography Conf. (TCC 09), LNCS 5444, Springer, 2009, pp. 496-502.
2. C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," Proc. 41st Ann. ACM Symp. Theory Computing (STOC 09), ACM, 2009, pp. 169-178.
3. E. Naone, "The Slow-Motion Internet," Technology Rev., Mar./Apr. 2011;
4. A. Greenberg, "IBM's Blindfolded Calculator," Forbes,13 July 2009;
5. P. Maniatis et al., "Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection," Proc. 13th Usenix Conf. Hot Topics in Operating Systems (HotOS 11), Usenix, 2011;
6. S. McCamant and M.D. Ernst, "Quantitative Information Flow as Network Flow Capacity," Proc. 2008 ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI 08), ACM, 2008, pp. 193-205.
7. M.S. Miller, "Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control," PhD dissertation, Dept. of Philosophy, Johns Hopkins Univ., 2006.
8. A. Sabelfeld and A.C. Myers, "Language-Based Information-Flow Security," IEEE J. Selected Areas Comm., Jan. 2003, pp. 5-19.
9. L. Whitney, "Microsoft Urges Laws to Boost Trust in the Cloud," CNET News,20 Jan. 2010;

Index Terms:
Security and Privacy, integrity, protection, verifiability, aggregation
Dawn Song, Elaine Shi, Ian Fischer, Umesh Shankar, "Cloud Data Protection for the Masses," Computer, vol. 45, no. 1, pp. 39-45, Jan. 2012, doi:10.1109/MC.2012.1
Usage of this product signifies your acceptance of the Terms of Use.