753 research outputs found
State of The Art and Hot Aspects in Cloud Data Storage Security
Along with the evolution of cloud computing and cloud storage towards matu-
rity, researchers have analyzed an increasing range of cloud computing security
aspects, data security being an important topic in this area. In this paper, we
examine the state of the art in cloud storage security through an overview of
selected peer reviewed publications. We address the question of defining cloud
storage security and its different aspects, as well as enumerate the main vec-
tors of attack on cloud storage. The reviewed papers present techniques for key
management and controlled disclosure of encrypted data in cloud storage, while
novel ideas regarding secure operations on encrypted data and methods for pro-
tection of data in fully virtualized environments provide a glimpse of the toolbox
available for securing cloud storage. Finally, new challenges such as emergent
government regulation call for solutions to problems that did not receive enough
attention in earlier stages of cloud computing, such as for example geographical
location of data. The methods presented in the papers selected for this review
represent only a small fraction of the wide research effort within cloud storage
security. Nevertheless, they serve as an indication of the diversity of problems
that are being addressed
An Attestation Architecture for Blockchain Networks
If blockchain networks are to become the building blocks of the
infrastructure for the future digital economy, then several challenges related
to the resiliency and survivability of blockchain networks need to be
addressed. The survivability of a blockchain network is influenced by the
diversity of its nodes. Trustworthy device-level attestations permits nodes in
a blockchain network to provide truthful evidence regarding their current
configuration, operational state, keying material and other system attributes.
In the current work we review the recent developments towards a standard
attestation architecture and evidence conveyance protocols. We explore the
applicability and benefits of a standard attestation architecture to blockchain
networks. Finally, we discuss a number of open challenges related to node
attestations that has arisen due to changing model of blockchain network
deployments, such as the use virtualization and containerization technologies
for nodes in cloud infrastructures.Comment: 33 pages, 10 figure
- β¦