Skip to main content

Cloud Security and Privacy by Design

  • Conference paper
  • First Online:
E-Democracy – Citizen Rights in the World of the New Computing Paradigms (e-Democracy 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 570))

Included in the following conference series:

Abstract

In current cloud paradigms and models, security and privacy are typically treated as add-ons and are not adequately integrated as functions of the cloud systems. The EU Project Prismacloud (Horizon 2020 programme; duration 2/2015–7/2018) sets out to address this challenge and yields a portfolio of novel technologies to build security enabled cloud services, guaranteeing the required security by built-in strong cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Camenisch, J., Lehmann, A., Neven, G.: Electronic identities need private credentials. IEEE Sec. Priv. 10(1), 80–83 (2012). http://doi.ieeecomputersociety.org/10.1109/MSP.2012.7

    Article  Google Scholar 

  2. Catalano, D.: Homomorphic signatures and message authentication codes. In: Abdalla, M., De Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 514–519. Springer, Heidelberg (2014)

    Google Scholar 

  3. Demirel, D., Derler, D., Hanser, C., Pöhls, H.C., Slamanig, D., Traverso, G.: PRISMACLOUD D4.4: overview of functional and malleable signature schemes. Technical report, H2020 Prismacloud (2015). www.prismacloud.eu

  4. European commission: European cloud computing strategy “unleashing the potential of cloud computing in Europe” (2012). http://ec.europa.eu/digital-agenda/en/european-cloud-computing-strategy. Accessed 31 March 2015

  5. Ghernaouti, S.: Cyber Power - Crime, Conflict and Security in Cyberspace. EPFL Press, Burlington (2013)

    Book  Google Scholar 

  6. Groß, T.: Signatures and efficient proofs on committed graphs and NP-statements. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 293–314. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  7. Lorünser, T., Happe, A., Slamanig, D.: ARCHISTAR: towards secure and robust cloud based data sharing. In: IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015, Vancouver, 30 November–3 December 2015. IEEE (2015)

    Google Scholar 

  8. Meyerson, A., Williams, R.: On the complexity of optimal \(k\)-anonymity. In: Symposium on Principles of Database Systems, PODS 2004, New York, USA (2004)

    Google Scholar 

  9. Müller-Quade, J., Unruh, D.: Long-term security and universal composability. J. Crypt. 23(4), 594–671 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  10. PRWeb: a cloud computing forecast summary for 2013–2017 from IDC, gartner and KPMG, citing a study by accenture (2013). http://www.prweb.com/releases/2013/11/prweb11341594.htm. Accessed 31 March 2015

  11. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  12. Slamanig, D., Hanser, C.: On cloud storage and the cloud of clouds approach. In: ICITST-2012, pp. 649–655. IEEE Press (2012)

    Google Scholar 

  13. Sweeney, L.: \(k\)-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  14. Transparency market research: cloud computing services market - global industry size, share, trends, analysis and forecasts 2012–2018 (2012). http://www.transparencymarketresearch.com/cloud-computing-services-market.html. Accessed 31 March 2015

  15. Walfish, M., Blumberg, A.J.: Verifying computations without reexecuting them. Commun. ACM 58(2), 74–84 (2015)

    Article  Google Scholar 

  16. Wästlund, E., Angulo, J., Fischer-Hübner, S.: Evoking comprehensive mental models of anonymous credentials. In: iNetSeC, pp. 1–14 (2011)

    Google Scholar 

  17. Weiss, M., Rozenberg, B., Barham, M.: Practical solutions for format-preserving encryption. CoRR abs/1506.04113 (2015). http://arxiv.org/abs/1506.04113

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Lorünser .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Lorünser, T., Länger, T., Slamanig, D. (2015). Cloud Security and Privacy by Design. In: Katsikas, S., Sideridis, A. (eds) E-Democracy – Citizen Rights in the World of the New Computing Paradigms. e-Democracy 2015. Communications in Computer and Information Science, vol 570. Springer, Cham. https://doi.org/10.1007/978-3-319-27164-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27164-4_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27163-7

  • Online ISBN: 978-3-319-27164-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics