1 / 12

Secure Cloud Storage Systems

Secure Cloud Storage Systems. Alp tekin Küpçü, Öznur Özkasap Ertem Esiner , Adilet Kachkeev Department of Computer Engineering, Ko ç University, İ stanbul. Security on Cloud Storage. 010110101011. Integrity. 010110101011. Current Generation Cloud Storage.

Download Presentation

Secure Cloud Storage Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Cloud Storage Systems Alptekin Küpçü, Öznur Özkasap Ertem Esiner, Adilet Kachkeev Department of Computer Engineering, Koç University, İstanbul

  2. Security on Cloud Storage 010110101011

  3. Integrity 010110101011

  4. Current Generation Cloud Storage “We will have no liability to you for any unauthorized access or use, corruption, deletion, destruction or loss of any of Your Content or Applications” –Amazon S3 license “Google and Partners DO NOT warrant that [...] Google services will be uninterrupted, timely, secure, or error-free.” –Google Apps Docs (Enterprise Edition) license

  5. Alteration 010110101011

  6. Alteration 010110101011 010110101000

  7. Alteration 010110101011

  8. Alteration by block 010110101011 11

  9. Alteration by block 010110101011 11 00

  10. Project Summary • We provide: • underlying data structure : optimized implementation of rank-based skip list(together with authenticated and ordinary skip lists) as a library. • Optimized proof mechanism between client and server (prototype) • What is next: • Optimizations with parallel I/O and cryptographic computation • Implementation on mobile devices • Energy consumption measurements and application of energy-efficiency methodologies

  11. Questions ?

More Related