메뉴 건너뛰기




Volumn , Issue , 2010, Pages

On the impossibility of cryptography alone for privacy-preserving cloud computing

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY;

EID: 84969931080     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (151)

References (28)
  • 3
    • 74049102823 scopus 로고    scopus 로고
    • Provable data possession at untrusted stores
    • G. Ateniese et al. Provable data possession at untrusted stores. In ACM CCS, pages 598-609, 2007.
    • (2007) ACM CCS , pp. 598-609
    • Ateniese, G.1
  • 7
    • 74049093526 scopus 로고    scopus 로고
    • Controlling data in the cloud: Outsourcing computation without outsourcing control
    • R. Chow et al. Controlling data in the cloud: Outsourcing computation without outsourcing control. In CCSW, 2009.
    • (2009) CCSW
    • Chow, R.1
  • 10
    • 21644455412 scopus 로고    scopus 로고
    • Terra: a virtual machine-based platform for trusted computing
    • T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In SOSP, pages 193-206, 2003.
    • (2003) SOSP , pp. 193-206
    • Garfinkel, T.1    Pfaff, B.2    Chow, J.3    Rosenblum, M.4    Boneh, D.5
  • 11
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages 169-178, 2009.
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 12
    • 71149116146 scopus 로고
    • How to play any mental game - a completeness theorem for protocols with honest majority
    • Preliminary version in FOCS'86
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - a completeness theorem for protocols with honest majority. J. of the ACM, 38(1):691-729, 1991. Preliminary version in FOCS'86.
    • (1991) J. of the ACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 14
    • 38049056625 scopus 로고    scopus 로고
    • Obfuscation for cryptographic purposes
    • D. Hofheinz, J. Malone-lee, and M. Stam. Obfuscation for cryptographic purposes. In In TCC 2007, LNCS 4392, pages 214-232, 2007.
    • (2007) TCC 2007, LNCS , vol.4392 , pp. 214-232
    • Hofheinz, D.1    Malone-lee, J.2    Stam, M.3
  • 17
    • 74049103479 scopus 로고    scopus 로고
    • PORs-proofs of retrievability for large files
    • ACM
    • A. Juels and B. Kaliski. PORs-proofs of retrievability for large files. In ACM CCS 2007, pages 584-597. ACM, 2007.
    • (2007) ACM CCS 2007 , pp. 584-597
    • Juels, A.1    Kaliski, B.2
  • 19
    • 77649264413 scopus 로고    scopus 로고
    • A first glimpse of cryptography's Holy Grail
    • March
    • D. Micciancio. A first glimpse of cryptography's Holy Grail. C. ACM, 53(3):96, March 2010.
    • (2010) C. ACM , vol.53 , Issue.3 , pp. 96
    • Micciancio, D.1
  • 22
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • E. Shen, E. Shi, and B. Waters. Predicate privacy in encryption systems. In TCC, pages 457-473, 2009.
    • (2009) TCC , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 23
    • 0033705124 scopus 로고    scopus 로고
    • Multi-dimensional range query over encrypted data
    • D. Song, D. Wagner, and A. Perrig. Multi-dimensional range query over encrypted data. In IEEE S&P, pages 44-55, 2000.
    • (2000) IEEE S&P , pp. 44-55
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 24
    • 80051997870 scopus 로고    scopus 로고
    • Companies slowly join cloud-computing
    • page 19 April
    • B. Stone and A. Vance. Companies slowly join cloud-computing. New York Times, page B1, 19 April 2010.
    • (2010) New York Times , pp. B1
    • Stone, B.1    Vance, A.2
  • 28
    • 0020312165 scopus 로고
    • Protocols for secure computations (extended abstract)
    • A. C. Yao. Protocols for secure computations (extended abstract). In FOCS, pages 160-164, 1982.
    • (1982) FOCS , pp. 160-164
    • Yao, A. C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.