Cryptographic Tools for Cloud Environments. / Alderman, James; Crampton, Jason; Martin, Keith.

Guide to Security Assurance for Cloud Computing. ed. / Shao Ying Zhu; Richard Hill; Marcello Trovati. Vol. Guide to Security Assurance for Cloud Computing Springer, 2016.

Research output: Chapter in Book/Report/Conference proceedingChapter

Published

Documents

Abstract

Cryptography provides techniques that can be used to implement core security services such as confidentiality and data integrity. We review some fundamental cryptographic mechanisms and identify some of the limitations of traditional cryptography with respect to cloud computing environments. We then review a number of relatively new cryptographic tools that have the potential to provide the extended security functionality required by some cloud computing applications.
Original languageEnglish
Title of host publicationGuide to Security Assurance for Cloud Computing
EditorsShao Ying Zhu, Richard Hill, Marcello Trovati
PublisherSpringer
VolumeGuide to Security Assurance for Cloud Computing
DOIs
StatePublished - 2016
This open access research output is licenced under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

ID: 25415832