log in  |  register  |  feedback?  |  help  |  web accessibility
Logo
Cryptographic Techniques for Secure Storage Outsourcing
Friday, October 11, 2013, 1:00-2:00 pm Calendar
  • You are subscribed to this talk through .
  • You are watching this talk through .
  • You are subscribed to this talk. (unsubscribe, watch)
  • You are watching this talk. (unwatch, subscribe)
  • You are not subscribed to this talk. (watch, subscribe)
Abstract

Cloud computing allows users to outsource their data to third-party providers, while offering numerous benefits such as economies of scale, easy scaling, and availability anywhere, anytime. An important challenge is how to secure one's data when the cloud provider is untrusted.

In this talk, I will cover cryptographic techniques that enable securestorage outsourcing. In particular, I will talk about 1) how to ensure the integrity of outsourced data; 2) how to obtain guarantees that no data loss has occurred; and 3) how to ensure the privacy of outsourced data.

This talk is organized by Jeff Foster