Cloud-Based Storage Model with Strong User Privacy Assurance

Cloud computing platforms require at least semi-trusted party as a host; we consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where there is no link between the users’ identity and the correspondent data. Furthermore the cloud provider does not required to be trusted by the customer.

[1]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[2]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[3]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[4]  Jan Camenisch,et al.  Compact E-Cash , 2005, EUROCRYPT.

[5]  Paul F. Syverson Onion routing for resistance to traffic analysis , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[6]  Lee Rainie,et al.  The future of cloud computing , 2010 .

[7]  Kris Popat,et al.  Human Interactive Proofs and Document Image Analysis , 2002, Document Analysis Systems.

[8]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[9]  Christopher Soghoian,et al.  Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era , 2009, J. Telecommun. High Technol. Law.