Securing Cloud Data under Key Exposure

TULAM SHANTHI, Dr CH VENKATRAMANA REDDY

Abstract


Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys, by means of coercion or backdoors in cryptographic software. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the attacker’s access to the ciphertext.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.