The amount of data created, stored, and processed has enormously increased in the last years. Today, millions of devices are connected to the Internet and generate a huge amount of (personal) data that need to be stored and processed using scalable, efficient, and reliable computing infrastructures. Cloud computing technology can be used to respond to these needs. Although cloud computing brings many benefits to users and companies, security concerns about the cloud still represent the major impediment for its wide adoption. We briefly survey the main challenges related to the storage and processing of data in the cloud. In particular, we focus on the problem of protecting data in storage, supporting fine-grained access, selectively sharing data, protecting query privacy, and verifying the integrity of computations.
Data security issues in cloud scenarios / S. De Capitani di Vimercati, S. Foresti, P. Samarati - In: Information systems security : 11. International conference, ICISS 2015, Kolkata, India, December 16–20, 2015 : Proceedings / [a cura di] S. Jajodia, C. Mazumdar. - Cham : Springer, 2015. - ISBN 9783319269603. - pp. 3-10 (( Intervento presentato al 11. convegno International conference on information systems security (ICISS) tenutosi a Kolkata (India) nel 2015.
Data security issues in cloud scenarios
S. De Capitani di VimercatiPrimo
;S. ForestiPenultimo
;P. Samarati
2015
Abstract
The amount of data created, stored, and processed has enormously increased in the last years. Today, millions of devices are connected to the Internet and generate a huge amount of (personal) data that need to be stored and processed using scalable, efficient, and reliable computing infrastructures. Cloud computing technology can be used to respond to these needs. Although cloud computing brings many benefits to users and companies, security concerns about the cloud still represent the major impediment for its wide adoption. We briefly survey the main challenges related to the storage and processing of data in the cloud. In particular, we focus on the problem of protecting data in storage, supporting fine-grained access, selectively sharing data, protecting query privacy, and verifying the integrity of computations.File | Dimensione | Formato | |
---|---|---|---|
dfs-iciss15.pdf
accesso aperto
Tipologia:
Post-print, accepted manuscript ecc. (versione accettata dall'editore)
Dimensione
264.57 kB
Formato
Adobe PDF
|
264.57 kB | Adobe PDF | Visualizza/Apri |
chp_10.1007_978-3-319-26961-0_1.pdf
accesso riservato
Tipologia:
Publisher's version/PDF
Dimensione
125.4 kB
Formato
Adobe PDF
|
125.4 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.