Publication detail

Efficient Security Solution for Privacy-Preserving Cloud Services

MALINA, L. HAJNÝ, J.

Original Title

Efficient Security Solution for Privacy-Preserving Cloud Services

English Title

Efficient Security Solution for Privacy-Preserving Cloud Services

Type

conference paper

Language

en

Original Abstract

In this paper, we present a novel privacy-preserving security solution for cloud services. We deal with user anonymous access to cloud services and shared storage servers. Our solution provides registered users with anonymous access to cloud ser- vices. Our solution offers anonymous access, unlinkability and the confidentiality of transmitted data. Moreover, we implement our solution and we output the experimental results and compare the performance with related solutions.

English abstract

In this paper, we present a novel privacy-preserving security solution for cloud services. We deal with user anonymous access to cloud services and shared storage servers. Our solution provides registered users with anonymous access to cloud ser- vices. Our solution offers anonymous access, unlinkability and the confidentiality of transmitted data. Moreover, we implement our solution and we output the experimental results and compare the performance with related solutions.

Keywords

Authentication, Cloud Computing, Cryptography, Encryption, Privacy, Security

RIV year

2013

Released

06.07.2013

ISBN

978-1-4799-0403-7

Book

36th International Conference on Telecommunications and Signal Processing TSP

Pages from

23

Pages to

28

Pages count

5

Documents

BibTex


@inproceedings{BUT100471,
  author="Lukáš {Malina} and Jan {Hajný}",
  title="Efficient Security Solution for Privacy-Preserving Cloud Services",
  annote="In this paper, we present a novel privacy-preserving
security solution for cloud services. We deal with user anonymous
access to cloud services and shared storage servers. Our solution
provides registered users with anonymous access to cloud ser-
vices. Our solution offers anonymous access, unlinkability and the confidentiality of
transmitted data. Moreover, we implement our solution and we
output the experimental results and compare the performance
with related solutions.",
  booktitle="36th International Conference on Telecommunications and Signal Processing TSP",
  chapter="100471",
  howpublished="electronic, physical medium",
  year="2013",
  month="july",
  pages="23--28",
  type="conference paper"
}