Refine
Year of publication
- 2016 (1)
Document Type
Conference Type
- Konferenzartikel (1)
Language
- English (1)
Has Fulltext
- no (1)
Is part of the Bibliography
- yes (1)
Keywords
- Cloud computing (1)
- Informationsvermittlung (1)
- Kryoptologie (1)
Institute
Open Access
- Closed Access (1)
In the work at hand, we combine a Private Information Retrieval (PIR) protocol with Somewhat Homomorphic Encryption (SHE) and use Searchable Encryption (SE) with the objective to provide security and confidentiality features for a third party cloud security audit. During the auditing process, a third party auditor will act on behalf of a cloud service user to validate the security requirements performed by a cloud service provider. Our concrete contribution consists of developing a PIR protocol which is proceeding directly on a log database of encrypted data and allowing to retrieve a sum or a product of multiple encrypted elements. Subsequently, we concretely apply our new form of PIR protocol to a cloud audit use case where searchable encryption is employed to allow additional confidentiality requirements to the privacy of the user. Exemplarily we are considering and evaluating an audit of client accesses to a controlled resource provided by a cloud service provider.