{"title":"Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography","authors":"H. Guesmi, L. Saïdane","doi":"10.1109/ICSEng.2017.32","DOIUrl":null,"url":null,"abstract":"This paper addresses the users' need to trust the commercial cloud providers and the security issues related to data storage in a cloud storage service. The cloud storage is one of the prominent services offered in cloud computing. Data stored over cloud in the plain text format represents a security threat. Thus, in this paper, we propose a method relying on the Identity Based Cryptography (IBE) for cloud storage that allows user to store and access the data securely. It also guarantees that only the authenticated client can access the data. This method provides security and privacy for data stored in public servers.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 25th International Conference on Systems Engineering (ICSEng)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSEng.2017.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper addresses the users' need to trust the commercial cloud providers and the security issues related to data storage in a cloud storage service. The cloud storage is one of the prominent services offered in cloud computing. Data stored over cloud in the plain text format represents a security threat. Thus, in this paper, we propose a method relying on the Identity Based Cryptography (IBE) for cloud storage that allows user to store and access the data securely. It also guarantees that only the authenticated client can access the data. This method provides security and privacy for data stored in public servers.