Security and Privacy in Communication Networks. 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers

Research Article

K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access

Download
363 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-31909-9_4,
        author={Saman Zarandioon and Danfeng Yao and Vinod Ganapathy},
        title={K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access},
        proceedings={Security and Privacy in Communication Networks. 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2012},
        month={10},
        keywords={Cloud Untrusted Storage Access Control Mashup Security Web},
        doi={10.1007/978-3-642-31909-9_4}
    }
    
  • Saman Zarandioon
    Danfeng Yao
    Vinod Ganapathy
    Year: 2012
    K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-31909-9_4
Saman Zarandioon1,*, Danfeng Yao2,*, Vinod Ganapathy1,*
  • 1: Rutgers University
  • 2: Virginia Tech
*Contact email: samanz@cs.rutgers.edu, danfeng@cs.vt.edu, vinodg@cs.rutgers.edu

Abstract

Security and privacy concerns hinder the adoption of cloud storage and computing in sensitive environments. We present a user-centric privacy-preserving cryptographic access control protocol called 2 (Key To Cloud) that enables end-users to securely store, share, and manage their sensitive data in an untrusted cloud storage anonymously. 2 is scalable and supports the lazy revocation. It can be easily implemented on top of existing cloud services and APIs – we demonstrate its prototype based on Amazon S3 API.