Engineering Cryptography for Security and Privacy in the Cloud.
Stephan KrennThomas LorünserChristoph StriecksPublished in: ERCIM News (2018)
Keyphrases
- security issues
- information security
- cloud computing
- security concerns
- statistical databases
- encrypted data
- data privacy
- security and privacy issues
- sensitive data
- security threats
- personal data
- preserving privacy
- privacy concerns
- data security
- security mechanisms
- rfid systems
- security risks
- privacy requirements
- privacy issues
- third party
- personal information
- encryption algorithms
- cloud computing environment
- cloud storage
- identity management
- privacy preserving
- network security
- security measures
- security requirements
- secure multiparty computation
- cryptographic protocols
- electronic payment
- homomorphic encryption
- security services
- biometric template
- cellular automata
- individual privacy
- security policies
- authentication protocol
- privacy enhancing
- security properties
- intrusion detection
- access control
- data center
- security management
- encryption scheme
- protection mechanisms
- cyber security
- privacy preserving data mining
- rfid tags
- smart card
- public key cryptography
- encryption algorithm
- software engineering
- private information
- sensitive information
- data storage
- data management
- security level
- differential privacy
- privacy preservation
- privacy protection
- cryptographic algorithms
- data sharing