title   
  

A security and privacy infrastructure for cloud computing using group signatures

Tahaoğlu, Fırat Hamit (2012) A security and privacy infrastructure for cloud computing using group signatures. [Thesis]

[img]PDF - Registered users only - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
1139Kb

Official URL: http://192.168.1.20/record=b1416995 (Table of Contents)

Abstract

New software applications are being developed every day by software development groups, ranging from the most professional to smaller amateur ones. The structures of the software development groups are very diverse, and a development environment should satisfy the needs of different kinds of group structure. Considering the advantages of low resource requirement, accessibility through mobile devices with restricted resources, and compatibility with collaborative working environments, Cloud computing is a perfect match for software developers, especially for the groups. However, since Cloud computing operates on insecure Internet, security against malicious third parties is a crucial issue. Files should be kept safe in the Cloud, and should only be accessed by those who have the authorization. Revocation and addition of the group members, and the organization of the access rights should also be performed in an efficient and robust way, fulfilling the needs of different groups. In this thesis, we propose a security and privacy infrastructure for a software development environment running in the Cloud. We propose to solve the security issues using the anonymous credential system, idemix, provided by IBM Research which relies on the Camenisch-Lysyanskaya group signature scheme. Group signatures can provide flexibility in the groups' inner organization and are also helpful for handling the access rights. Moreover, using an anonymous credential system also provides to the group members the ability to keep their anonymity while interacting with Cloud. In this way, we aim to provide an infrastructure to serve the groups with different inner organizations by not compromising their privacy. In order to evaluate the performance of the proposed system, we develop a simulation environment using M/D/m/m queues and analyze the proposed system under different scenarios and access control structures. Our results show that the proposed system is an efficient one and can serve up to 1000 concurrent users with response time under one second using four servers.

Item Type:Thesis
Uncontrolled Keywords:Group signatures. -- Cloud computing. -- Cloud security. -- Access rights. -- Grup imzaları. -- Bulut Bilişim. -- Güvenlik.
Subjects:T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800-8360 Electronics > TK7885-7895 Computer engineering. Computer hardware
ID Code:26786
Deposited By:IC-Cataloging
Deposited On:18 Mar 2015 15:32
Last Modified:18 Mar 2015 15:32

Repository Staff Only: item control page