Cloud Security and Privacy by Design

  • Thomas Lorünser
  • Thomas Länger
  • Daniel Slamanig
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 570)


In current cloud paradigms and models, security and privacy are typically treated as add-ons and are not adequately integrated as functions of the cloud systems. The EU Project Prismacloud (Horizon 2020 programme; duration 2/2015–7/2018) sets out to address this challenge and yields a portfolio of novel technologies to build security enabled cloud services, guaranteeing the required security by built-in strong cryptography.


Secure cloud computing Cryptography Privacy Information theoretic security Usability Security by design 


  1. 1.
    Camenisch, J., Lehmann, A., Neven, G.: Electronic identities need private credentials. IEEE Sec. Priv. 10(1), 80–83 (2012). CrossRefGoogle Scholar
  2. 2.
    Catalano, D.: Homomorphic signatures and message authentication codes. In: Abdalla, M., De Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 514–519. Springer, Heidelberg (2014) Google Scholar
  3. 3.
    Demirel, D., Derler, D., Hanser, C., Pöhls, H.C., Slamanig, D., Traverso, G.: PRISMACLOUD D4.4: overview of functional and malleable signature schemes. Technical report, H2020 Prismacloud (2015).
  4. 4.
    European commission: European cloud computing strategy “unleashing the potential of cloud computing in Europe” (2012). Accessed 31 March 2015
  5. 5.
    Ghernaouti, S.: Cyber Power - Crime, Conflict and Security in Cyberspace. EPFL Press, Burlington (2013) CrossRefGoogle Scholar
  6. 6.
    Groß, T.: Signatures and efficient proofs on committed graphs and NP-statements. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 293–314. Springer, Heidelberg (2015) CrossRefGoogle Scholar
  7. 7.
    Lorünser, T., Happe, A., Slamanig, D.: ARCHISTAR: towards secure and robust cloud based data sharing. In: IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015, Vancouver, 30 November–3 December 2015. IEEE (2015)Google Scholar
  8. 8.
    Meyerson, A., Williams, R.: On the complexity of optimal \(k\)-anonymity. In: Symposium on Principles of Database Systems, PODS 2004, New York, USA (2004)Google Scholar
  9. 9.
    Müller-Quade, J., Unruh, D.: Long-term security and universal composability. J. Crypt. 23(4), 594–671 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    PRWeb: a cloud computing forecast summary for 2013–2017 from IDC, gartner and KPMG, citing a study by accenture (2013). Accessed 31 March 2015
  11. 11.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Slamanig, D., Hanser, C.: On cloud storage and the cloud of clouds approach. In: ICITST-2012, pp. 649–655. IEEE Press (2012)Google Scholar
  13. 13.
    Sweeney, L.: \(k\)-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefzbMATHGoogle Scholar
  14. 14.
    Transparency market research: cloud computing services market - global industry size, share, trends, analysis and forecasts 2012–2018 (2012). Accessed 31 March 2015
  15. 15.
    Walfish, M., Blumberg, A.J.: Verifying computations without reexecuting them. Commun. ACM 58(2), 74–84 (2015)CrossRefGoogle Scholar
  16. 16.
    Wästlund, E., Angulo, J., Fischer-Hübner, S.: Evoking comprehensive mental models of anonymous credentials. In: iNetSeC, pp. 1–14 (2011)Google Scholar
  17. 17.
    Weiss, M., Rozenberg, B., Barham, M.: Practical solutions for format-preserving encryption. CoRR abs/1506.04113 (2015).

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Thomas Lorünser
    • 1
  • Thomas Länger
    • 2
  • Daniel Slamanig
    • 3
  1. 1.AIT Austrian Institute of TechnologyViennaAustria
  2. 2.University of LausanneLausanneSwitzerland
  3. 3.Graz University of TechnologyGrazAustria

Personalised recommendations