securing_access_to_cloud_storage
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
securing_access_to_cloud_storage [2013/05/02 17:49] – [The Proposed Approach] m.r.asghar@unitn.it | securing_access_to_cloud_storage [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 4: | Line 4: | ||
==== The Proposed Approach ==== | ==== The Proposed Approach ==== | ||
- | {{: | + | The proposed architecture aims at providing mechanism that can be deployed in an outsourced environment. The following figure illustrates the proposed architecture that has similar components to the widely accepted architecture for the policy-based management proposed by IETF. The proposed architecture uses proxy re-encryption to protect data and access control policies, where a Trusted Key Management Authority (TKMA) distributes keys to users including Admin User and Requester. The TKMA sends server side keys to the Key Store managed by the Service Provider in the Outsourced Environment. In the proposed architecture, |
+ | |||
+ | {{generic-arch.png|The proposed architecture}} | ||
==== Themes ==== | ==== Themes ==== | ||
Line 18: | Line 21: | ||
* [[http:// | * [[http:// | ||
- | * Mihaela Ion | ||
- | * [[http:// | ||
* [[http:// | * [[http:// | ||
+ | * [[http:// | ||
+ | * Mihaela Ion | ||
==== Publications ==== | ==== Publications ==== | ||
- | * Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **ESPOON< | + | |
+ | | ||
* Mihaela Ion, Giovanni Russello, and Bruno Crispo, **Enforcing Multi-user Access Policies to Encrypted Cloud Databases**, | * Mihaela Ion, Giovanni Russello, and Bruno Crispo, **Enforcing Multi-user Access Policies to Encrypted Cloud Databases**, | ||
* Muhammad Rizwan Asghar, Giovanni Russello, and Bruno Crispo, **Poster: ESPOON< | * Muhammad Rizwan Asghar, Giovanni Russello, and Bruno Crispo, **Poster: ESPOON< | ||
- | * Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments**, | + | * Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments**, |
- | * Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **Securing Data Provenance in the Cloud**, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, | + | * Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo, **Securing Data Provenance in the Cloud**, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, |
==== Talks, Tutorials and Demo ==== | ==== Talks, Tutorials and Demo ==== | ||
+ | * Muhammad Rizwan Asghar, **ESPOON: Enforcing Security Policies in Outsourced Environments**, | ||
* Muhammad Rizwan Asghar, **Enforcing Security Policies in Outsourced Environments**, | * Muhammad Rizwan Asghar, **Enforcing Security Policies in Outsourced Environments**, | ||
* Muhammad Rizwan Asghar, **ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments**, | * Muhammad Rizwan Asghar, **ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments**, | ||
Line 40: | Line 45: | ||
* [[http:// | * [[http:// | ||
* [[http:// | * [[http:// | ||
+ | |||
+ | |||
+ | ==== Software ==== | ||
+ | * As a result of this research activity, we have developed a prototype for securing data, as well as access control policies in outsourced environments. To get the source code, please contact [[http:// |
securing_access_to_cloud_storage.1367509795.txt.gz · Last modified: (external edit)