The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January (2012 vol.45)
pp: 39-45
Dawn Song , University of California, Berkeley
Elaine Shi , University of California, Berkeley
Ian Fischer , University of California, Berkeley
Umesh Shankar , Google
ABSTRACT
Offering strong data protection to cloud users while enabling rich applications is a challenging task. Researchers explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.
INDEX TERMS
Security and Privacy, integrity, protection, verifiability, aggregation
CITATION
Dawn Song, Elaine Shi, Ian Fischer, Umesh Shankar, "Cloud Data Protection for the Masses", Computer, vol.45, no. 1, pp. 39-45, January 2012, doi:10.1109/MC.2012.1
REFERENCES
1. C. Dwork, "The Differential Privacy Frontier Extended Abstract," Proc. 6th Theory of Cryptography Conf. (TCC 09), LNCS 5444, Springer, 2009, pp. 496-502.
2. C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," Proc. 41st Ann. ACM Symp. Theory Computing (STOC 09), ACM, 2009, pp. 169-178.
3. E. Naone, "The Slow-Motion Internet," Technology Rev., Mar./Apr. 2011; www.technologyreview.com/files/54902/GoogleSpeed_charts.pdf.
4. A. Greenberg, "IBM's Blindfolded Calculator," Forbes,13 July 2009; www.forbes.com/forbes/2009/0713/breakthroughs-privacy-super-secret-encryption.html.
5. P. Maniatis et al., "Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection," Proc. 13th Usenix Conf. Hot Topics in Operating Systems (HotOS 11), Usenix, 2011; www.usenix.org/events/hotos11/tech/final_files/ManiatisAkhawe.pdf.
6. S. McCamant and M.D. Ernst, "Quantitative Information Flow as Network Flow Capacity," Proc. 2008 ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI 08), ACM, 2008, pp. 193-205.
7. M.S. Miller, "Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control," PhD dissertation, Dept. of Philosophy, Johns Hopkins Univ., 2006.
8. A. Sabelfeld and A.C. Myers, "Language-Based Information-Flow Security," IEEE J. Selected Areas Comm., Jan. 2003, pp. 5-19.
9. L. Whitney, "Microsoft Urges Laws to Boost Trust in the Cloud," CNET News,20 Jan. 2010; http://news.cnet.com/8301-1009_3-10437844-83.html.
36 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool