40 likes | 245 Views
Security and Privacy in Cloud Computing. Ragib Hasan Johns Hopkins University en.600.412 Spring 2011. Lecture 4 02 /21/ 2011. Securing Data in a Cloud. Problem How do we secure data that has been outsourced to a cloud? Goal Learn about different techniques in secure data outsourcing
E N D
Security and Privacy in Cloud Computing Ragib HasanJohns Hopkins Universityen.600.412 Spring 2011 Lecture 4 02/21/2011
Securing Data in a Cloud Problem How do we secure data that has been outsourced to a cloud? Goal Learn about different techniques in secure data outsourcing Review Assignment #3 Ateniese et al., Provable data possession at untrusted store, CCS 2007 en.600.412 Spring 2011 Lecture 4 | JHU | Ragib Hasan
Recap From last lecture: Trustworthy Cloud Computing Platform Pros: Cons: Ideas: en.600.412 Spring 2011 Lecture 4 | JHU | Ragib Hasan
Provable Data Possession Idea: Don’t trust the server, rather challenge it from time to time to see if it still has the data Goals: Client should retain minimal amount of metadata, challenges should be small, and responses shouldn’t be easy to guess en.600.412 Spring 2011 Lecture 4 | JHU | Ragib Hasan