600.412.lecture04

600.412.lecture04 - Computing Platform Pros: Cons: Ideas:...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Ragib Hasan Johns Hopkins University Lecture 4 02/21/201 1 Security and Privacy in Cloud Computing
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Securing Data in a Cloud Problem How do we secure data that has been outsourced to a cloud? Goal Learn about different techniques in secure data outsourcing Review Assignment #3 Ateniese et al., Provable data possession at untrusted store, CCS 2007 02/21/2011 2 en.600.412 Spring 2011 Lecture 4 |
Background image of page 2
Recap From last lecture: Trustworthy Cloud
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Computing Platform Pros: Cons: Ideas: 02/21/2011 en.600.412 Spring 2011 Lecture 4 | 3 Provable Data Possession Idea: Dont trust the server, rather challenge it from time to time to see if it still has the data Goals: Client should retain minimal amount of metadata, challenges should be small, and responses shouldnt be easy to guess 02/21/2011 en.600.412 Spring 2011 Lecture 4 | 4...
View Full Document

Page1 / 4

600.412.lecture04 - Computing Platform Pros: Cons: Ideas:...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online