An identity-based security infrastructure for Cloud environments.
Christian SchriddeTim DörnemannErnst JuhnkeBernd FreislebenMatthew SmithPublished in: WCNIS (2010)
Keyphrases
- computing infrastructure
- key management
- cloud services
- cloud computing
- signcryption scheme
- encryption scheme
- security services
- identity based cryptography
- computing environments
- cloud computing environment
- key distribution
- security issues
- authentication and key agreement
- standard model
- information security
- cloud storage
- service providers
- virtual machine
- highly distributed
- access control
- private cloud
- intrusion detection
- network security
- data center
- data management
- provably secure
- security requirements
- security problems
- security protocols
- security analysis
- security policies
- blind signature scheme
- statistical databases
- resource constrained
- sensitive data