Transcript
Page 1: Security  and  Privacy  in  Cloud Computing

Ragib HasanJohns Hopkins Universityen.600.412 Spring 2011

Lecture 402/21/2011

Security and Privacy in Cloud Computing

Page 2: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 4 | JHU | Ragib Hasan 2

Securing Data in a Cloud

ProblemHow do we secure data that has been outsourced to a cloud?

GoalLearn about different techniques in secure data outsourcing

Review Assignment #3Ateniese et al., Provable data possession at untrusted store, CCS 2007

02/21/2011

Page 3: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 4 | JHU | Ragib Hasan 3

Recap

From last lecture: Trustworthy Cloud Computing Platform

Pros:

Cons:

Ideas:02/21/2011

Page 4: Security  and  Privacy  in  Cloud Computing

en.600.412 Spring 2011 Lecture 4 | JHU | Ragib Hasan 4

Provable Data Possession

Idea:Don’t trust the server, rather challenge it from time to time to see if it still has the data

Goals:Client should retain minimal amount of metadata, challenges should be small, and responses shouldn’t be easy to guess

02/21/2011


Recommended