Abstract
Cloud computing infrastructures offer many advantages to users, including large storage and high computation power. However, offloading workloads to hosting environments raises trust and privacy concerns. Algorithms that address these concerns require multiple network transactions and have low performance.
Original language | English |
---|---|
Article number | 8123460 |
Pages (from-to) | 61-67 |
Number of pages | 7 |
Journal | IEEE Security and Privacy |
Volume | 15 |
Issue number | 6 |
DOIs | |
State | Published - 1 Nov 2017 |
Bibliographical note
Publisher Copyright:© 2003-2012 IEEE.
Funding
This research was supported by the Blavatnik Interdisciplinary Cyber Research Center at Tel Aviv University, the PQCRYPTO project, which is partially funded by the European Commission Horizon 2020 research programme (grant 645622); the Israel Science Foundation (grant 1018/16); the Israel Ministry of Science and Technology (grant 3-10883), and the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office.
Funders | Funder number |
---|---|
Israel Ministry of Science and Technology | 3-10883 |
Horizon 2020 Framework Programme | 645622 |
Israel Science Foundation | 1018/16 |
Tel Aviv University |
Keywords
- cloud computing
- security
- trusted proxy