Download now Free registration required
Contrary to many other approaches to security and privacy in the cloud, the authors are interested in the problem of hiding behavioral information of users consuming their cloud resources, e.g. CPU time or storage space, from the cloud provider. More precisely, they are looking for solutions that allow users to purchase a contingent of resources from a cloud provider and to anonymously consume their resources till their limit is reached (in case of storage they can also reclaim these resources back anonymously). They present a definition of such anonymous yet authorized and bounded cloud resource schemes along with an instantiation based on Camenisch-Lysyanskaya signatures.
- Format: PDF
- Size: 218.7 KB