Faster Secure Cloud Computations with a Trusted Proxy

Nir Drucker, Shay Gueron, Benny Pinkas

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

Cloud computing infrastructures offer many advantages to users, including large storage and high computation power. However, offloading workloads to hosting environments raises trust and privacy concerns. Algorithms that address these concerns require multiple network transactions and have low performance.

Original languageEnglish
Article number8123460
Pages (from-to)61-67
Number of pages7
JournalIEEE Security and Privacy
Volume15
Issue number6
DOIs
StatePublished - 1 Nov 2017

Bibliographical note

Publisher Copyright:
© 2003-2012 IEEE.

Keywords

  • cloud computing
  • security
  • trusted proxy

Fingerprint

Dive into the research topics of 'Faster Secure Cloud Computations with a Trusted Proxy'. Together they form a unique fingerprint.

Cite this