Faster Secure Cloud Computations with a Trusted Proxy

Nir Drucker, Shay Gueron, Benny Pinkas

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

Cloud computing infrastructures offer many advantages to users, including large storage and high computation power. However, offloading workloads to hosting environments raises trust and privacy concerns. Algorithms that address these concerns require multiple network transactions and have low performance.

Original languageEnglish
Article number8123460
Pages (from-to)61-67
Number of pages7
JournalIEEE Security and Privacy
Volume15
Issue number6
DOIs
StatePublished - 1 Nov 2017

Bibliographical note

Publisher Copyright:
© 2003-2012 IEEE.

Funding

This research was supported by the Blavatnik Interdisciplinary Cyber Research Center at Tel Aviv University, the PQCRYPTO project, which is partially funded by the European Commission Horizon 2020 research programme (grant 645622); the Israel Science Foundation (grant 1018/16); the Israel Ministry of Science and Technology (grant 3-10883), and the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office.

FundersFunder number
Israel Ministry of Science and Technology3-10883
Horizon 2020 Framework Programme645622
Israel Science Foundation1018/16
Tel Aviv University

    Keywords

    • cloud computing
    • security
    • trusted proxy

    Fingerprint

    Dive into the research topics of 'Faster Secure Cloud Computations with a Trusted Proxy'. Together they form a unique fingerprint.

    Cite this