Practical Revocable Cryptographic Schemes for Cloud-Based Applications

Year

2018

Degree Name

Doctor of Philosophy

Department

School of School of Computing and Information Technology

Abstract

Cloud computing has been widely recognised as one of the most influential information technologies because of its intrinsic resource-sharing and low maintenance characteristics. In spite of its widely recognised benefits, cloud users lose the direct control of their data and rely on the cloud servers to manage, which raises significant security to be one of the major barriers to the adoption of cloud. The cloud security problems mainly originate from the fact that the cloud providers are usually operated by commercial service providers which are often outside the trusted domain of the users. Therefore, it is desirable to apply practical security approaches to address the security risks for the wide adoption of cloud computing. In this thesis, we focus on the study of practical revocable cryptographic systems for ensuring some essential security properties, including confidentiality, access control and authenticity in cloud computing.

FoR codes (2008)

0804 DATA FORMAT

Share

COinS
 

Unless otherwise indicated, the views expressed in this thesis are those of the author and do not necessarily represent the views of the University of Wollongong.