Abstract
Public cloud storages such as Box, Dropbox, Google Drive or OneDrive provide a great services of file storing, sharing and collaboration. But these services are provided at the cost of storage providers having access to all users data. This is a very serious security issue and is an obstacle which discourages many individuals and businesses from using these services. Many security solutions have been emerged in recent years to allow using the cloud storages in a secure way. However the design of advanced cloud encryption gateway which will secure users data in clouds without compromising their usability and convenience is a hard scientific and technical problem. In this paper we will review the existing solutions and will briefly introduce our own solution called Skycryptor which provides a perfect secrecy for users without compromising other advantages offered by cloud storage providers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. OReilly media, Sebastopol (2009)
Fu, K.E.: Group sharing and random access in cryptographic storage file systems, Masters thesis, MIT (1999)
Goh, E.-J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS : securing remote untrusted storage. In: Proceedings of NDSS, no. 0121481, ISOC, Geneva (2003)
Harrington, A., Jensen, C. Cryptographic access control in a distributed file system. In: Proceedings of 8th ACM Symposium on Access Control Models and Technologies (2003)
Fu, K.: Integrity and access control in untrusted content distribution networks. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA (2005)
Kallahalla, M., Riedel, E., Swaminathah, R., Wang, Q., Fu, K.: Plutus: scalable secure file sharing on untrusted storage. In: USENIX (2003)
Ateniese, G., Benson, K., Hohenberger, S.: Key-private proxy re-encryption. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 279–294. Springer, Heidelberg (2009)
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007)
Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)
Ag, L.: Wuala - secure online storage (2010). http://www.wuala.com
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Jivanyan, A., Yeghiazaryan, R., Darbinyan, A., Manukyan, A. (2015). Secure Collaboration in Public Cloud Storages. In: Baloian, N., Zorian, Y., Taslakian, P., Shoukouryan, S. (eds) Collaboration and Technology. CRIWG 2015. Lecture Notes in Computer Science(), vol 9334. Springer, Cham. https://doi.org/10.1007/978-3-319-22747-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-22747-4_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22746-7
Online ISBN: 978-3-319-22747-4
eBook Packages: Computer ScienceComputer Science (R0)