Secure Data Access on Untrusted Server in Cloud Computing

클라우드 컴퓨팅에서 신뢰하지 않는 서버 데이터의 안전한 접근

  • Published : 2010.12.31

Abstract

Keywords

References

  1. 민옥기, 이미영, 허성진, 김창수, 훤히 보이는 클라우드 컴퓨팅(ETRI easy IT), 전자신문사, 2009년 10월
  2. 마이클밀러 저, 최윤석 역, 사례로 읽는 클라우드 컴퓨팅, 에이콘출판사, 2009년 2월
  3. Cloud Security Alliance, Security Guidance for Critical areas of focus in cloud computing version 2.1, December, 2009 http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf
  4. I. Verbauwhede, F. Hoornaert, J. Vandewalle, and H. De Man, "Security and Performance Optimization of a New DES Data Encryption Chip", IEEE Journal of Solid-State Circuits, 23(3):647-656, 1988 https://doi.org/10.1109/4.302
  5. Leander, C. Paar, A. Poschmann, K. Schramm "New Lightweight DES Variants", Fast Software Encryption 2007-FSE 2007, Luxembourg City, Luxembourg, Marz 26-28, 2007.A
  6. M. Feldhofer, J. Wolkerstorfer, V. Rijmen, "AES Implementation on a Grain of Sand", Information Security, IEE Proceedings, Vol. 152, Nr. 1, pp. 13-20, 2005 https://doi.org/10.1049/ip-com:20040966
  7. L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "Public-Key Cryptography for RFID-Tags", Proceedings of IEEE International Workshop on Pervasive Computing and Communication Security 2007, New York, USA 2007
  8. Yoonjeong Kim, SeongYong Ohm, Kang Yi, "Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm", IEICE transaction on Information Systems, Vol.E92-D, No.3, pp. 545-547, March, 2009 https://doi.org/10.1587/transinf.E92.D.545
  9. Johannes Wolkestorfer, Hardware Aspects of Elliptic Curve Cryptography, PhdThesis, Graz University of Technology, Graz, Austria, 2004
  10. SandeepKumar, ChristofPaar, "Reconfigurable Instruction Set Extension for enabling ECC on an 8-bit Processor", International Conference on Field-Programmable Logic and Applications (FPL) 2004, Antwerp, Belgium, August 30 -September 1, 2004
  11. Sandeep Kumar and Christof Paar, "Are Standards Compliant Elliptic Curve Cryptosystems feasible on RFID?", Workshop on RFID Security 2006, Graz, Austria, July, 2006
  12. HIGHT 블록암호 알고리즘 사양 및 세부 명세서, 한국인터넷진흥원, 2009
  13. Matsumoto, Kato, Imai, "Speeding up secret computations with insecure auxiliary devices", EuroCrypt'92, LNCS 658, Springer-Verlag, 1993, 153-162
  14. www.apple.co.kr, www.samsungmobile.com
  15. ENISA(European Network and Information Security Agency), Cloud Computing: Benefits, risks and recommendations for information security, November, 2009
  16. Cloud Security Alliance(CSA), Top Threats to Cloud Computing v1.0, March, 2010
  17. Nick Coblentz, Cloud Computing Data Security, March, 2004, http://nickcoblentz.blogspot.com/2009/03/cloud-computing-data-security.html
  18. Jon Brodkin, "Gartner: Seven cloud-computing security risks", Network World, July, 2008
  19. Cong Wang, Qui Wang, Kui Ren, Illinois Institute of Technology, "Ensuring Data Storage Security in Cloud Computing", IEEE International Workshop on Quality of Service(IWQoS), 2009
  20. Shucheng Yu., Cong Wan, Kui Ren, and Wenjing Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing", IEEE INFOCOM 2010, 2010.3
  21. Vishal Kher, Yongdae Kim, "Securing Distributed Storage: Challenges, Techniques, and Systems", ACM International Workshop on Storage Security and Survivability(StorageSS), 2005
  22. Pierangela Samarati, Sabrina De Capitani di Vimercati, "Data Protection in Outsourcing Scenarios: Issues and directions", ACM Symposium on Information, Computer and Communications Security(ASIACCS), 2010