Cryptographic Techniques for Secure Storage Outsourcing
Abstract
Cloud computing allows users to outsource their data to third-party providers, while offering numerous benefits such as economies of scale, easy scaling, and availability anywhere, anytime. An important challenge is how to secure one's data when the cloud provider is untrusted.
In this talk, I will cover cryptographic techniques that enable securestorage outsourcing. In particular, I will talk about 1) how to ensure the integrity of outsourced data; 2) how to obtain guarantees that no data loss has occurred; and 3) how to ensure the privacy of outsourced data.
This talk is organized by Jeff Foster