Computer Science – Cryptography and Security
Scientific paper
2010-12-03
CLOUD COMPUTING 2010 : The First International Conference on Cloud Computing, GRIDs, and Virtualization - ISBN: 978-1-61208-00
Computer Science
Cryptography and Security
7 pages, 9 figures, Cloud Computing 2010
Scientific paper
Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for multiuser databases. Users, however, are very diffident for not having full control over their sensitive data. Untrusted database-as-a-server techniques are neither readily extendable to the cloud environment nor easily understandable by non-technical users. To solve this problem, we present an approach where agents share reserved data in a secure manner by the use of simple grant-and-revoke permissions on shared data.
Damiani Ernesto
Pagano Francesco
No associations
LandOfFree
Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-515388