Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers

作者: Alejandro Sanchez-Gomez , Jesus Diaz , Luis Hernandez-Encinas , David Arroyo

DOI: 10.1007/978-3-319-58424-9_15

关键词:

摘要: The twenty-first century belongs to the world of computing, specially as a result so-called cloud computing. This technology enables ubiquitous information management and thus people can access all their data from any place at time. In this landscape, emergence storage has had an important role in last 5 years. Nowadays, several free-access public services make it possible for users have free backup assets manage share them, representing low-cost opportunity Small Medium Enterprises (SMEs). However, adoption involves outsourcing, so user does not guarantee about way her will be processed protected. Therefore, seems necessary endow with set means protect users’ confidentiality privacy, assess integrity proper assets. Along paper, we discuss main challenges achieve such goal, underlining functionalities already implemented most popular services.

参考文章(49)
Wanpeng Li, Chris J. Mitchell, Security Issues in OAuth 2.0 SSO Implementations international conference on information security. pp. 529- 541 ,(2014) , 10.1007/978-3-319-13257-0_34
James Ransome, Anmol Misra, Core Software Security: Security at the Source ,(2013)
Alma Whitten, J. D. Tygar, Why Johnny can't encrypt: a usability evaluation of PGP 5.0 usenix security symposium. pp. 14- 14 ,(1999)
Dan Bogdanov, Sven Laur, Jan Willemson, Sharemind: A Framework for Fast Privacy-Preserving Computations european symposium on research in computer security. pp. 192- 206 ,(2008) , 10.1007/978-3-540-88313-5_13
Russell G. Shirey, Kenneth M. Hopkinson, Kyle E. Stewart, Douglas D. Hodson, Brett J. Borghetti, Analysis of Implementations to Secure Git for Use as an Encrypted Distributed Version Control System 2015 48th Hawaii International Conference on System Sciences. pp. 5310- 5319 ,(2015) , 10.1109/HICSS.2015.625
Michel Abdalla, Pierre-Alain Fouque, David Pointcheval, Password-Based Authenticated Key Exchange in the Three-Party Setting Public Key Cryptography - PKC 2005. ,vol. 3386, pp. 65- 84 ,(2005) , 10.1007/978-3-540-30580-4_6
Santiago Escobar, Catherine Meadows, José Meseguer, Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties Foundations of Security Analysis and Design V. pp. 1- 50 ,(2009) , 10.1007/978-3-642-03829-7_1
Thomas D. Wu, The Secure Remote Password Protocol. network and distributed system security symposium. ,(1998)
Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis, Discovering concrete attacks on website authorization by formal analysis Journal of Computer Security. ,vol. 22, pp. 601- 657 ,(2014) , 10.3233/JCS-140503