D5.7 Final Report on Privacy and Anonymization Techniques
PRISMACLOUD implements novel cryptographic concepts and methods to lift them into practical application and improve the security and privacy of cloud based services, while at the same time make the services accessible to providers and end users. The purpose of...
DetailsD5.3 Advanced architecture for distributed storage in dynamic environments
In this report we present the specication of the secure object storage tool (SECOSTOR), as it has been developed in the project. The tool comes with a clean architecture and easy to use modules and interfaces. All components are...
DetailsD5.9 Analysis of malleable signatures for defining allowed modification and providing verifiable means of conformant processing
PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users. The purpose of this deliverable is to present the nal...
DetailsAgile Cryptographic Solutions for the Cloud
Cloud computing, with its estimated market size of 150 billion USD annual turnover, is one of the major growth areas in information and communication technologies today. As a paradigm building on outsourcing of storage and processing, cloud computing suffers...
DetailsPost-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
We propose a new class of post-quantum digital signature schemes that: (a) derive their security entirely from the security of symmetric-key primitives, believed to be quantum-secure, and (b) have extremely small keypairs, and, (c) are highly parameterizable. In our...
DetailsMoPS: A Modular Protection Scheme for Long-Term Storage
Current trends in technology, such as cloud computing, allow outsourcing the storage, backup, and archiving of data. This provides efficiency and flexibility, but also poses new risks for data security. It in particular became crucial to develop protection schemes...
DetailsLinearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability
In this work the first linearly homomorphic authenticated encryption scheme with public verifiability and provable correctness, called LEPCoV , is presented. It improves the initial proposal by avoiding false negatives during the verification algorithm. This work provides a detailed...
DetailsPosition Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures
Sanitizable signature schemes (SSS), as well as redactable signature schemes (RSS), gained a lot of attention in the recent past. In a nutshell, both types of signature schemes allow to alter signed data in a controlled way by a,...
DetailsThe Archistar Secret-Sharing Backup Proxy
Cloud-Storage has become part of the standard toolkit for enterprise-grade computing. While being cost-and energy-eecient, cloud storage's availability and data conndentiality can be problematic. A common approach of mitigating those issues are cloud-of-cloud solutions. Another challenge is the integration...
DetailsEvidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
In distributed storage systems, documents are shared among multiple Cloud providers and stored within their respective storage servers. In social secret sharing-based distributed storage systems, shares of the documents are allocated according to the trustworthiness of the storage servers....
Details