Cryptography for the Cloud View Homepage


Ontology type: schema:MonetaryGrant     


Grant Info

YEARS

2014-2019

FUNDING AMOUNT

2168261 EUR

ABSTRACT

Many companies have already started the migration to the Cloud and many individuals share their personal informations on social networks. Unfortunately, in the current access mode, the provider first authenticates the client, and grants him access, or not, according to his rights in the access-control list. Therefore, the provider itself not only has total access to the data, but also knows which data are accessed, by whom, and how: privacy, which includes secrecy of data (confidentiality), identities (anonymity), and requests (obliviousness), should be enforced. The industry of the Cloud introduces a new implicit trust requirement: nobody has any idea at all of where and how his data are stored and manipulated, but everybody should blindly trust the providers. Privacy-compliant procedures cannot be left to the responsibility of the provider: however strong the trustfulness of the provider may be, any system or human vulnerability can be exploited against privacy. This presents too huge a threat to tolerate. The distribution of the data and the secrecy of the actions must be given back to the users. It requires promoting privacy as a global security notion. A new generation of secure multi-party computation protocols is required to protect everybody in an appropriate way, with privacy and efficiency: interactive protocols will be the core approach to provide privacy in practical systems. Privacy for the Cloud will have a huge societal impact since it will revolutionize the trust model: users will be able to make safe use of outsourced storage, namely for personal, financial and medical data, without having to worry about failures or attacks of the server. It will also have a strong economic impact, conferring a competitive advantage on Cloud providers implementing these tools. More... »

URL

http://cordis.europa.eu/project/rcn/185411_en.html

Related SciGraph Publications

  • 2018-10. Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier in JOURNAL OF CRYPTOLOGY
  • 2018-07-25. Indifferentiable Authenticated Encryption in ADVANCES IN CRYPTOLOGY – CRYPTO 2018
  • 2018-07-24. Fast Homomorphic Evaluation of Deep Discretized Neural Networks in ADVANCES IN CRYPTOLOGY – CRYPTO 2018
  • 2018-07-24. Combiners for Backdoored Random Oracles in ADVANCES IN CRYPTOLOGY – CRYPTO 2018
  • 2018-06-10. New Protocols for Secure Equality Test and Comparison in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2018-06-10. Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2018-03-31. Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2018
  • 2018-03-31. Fuzzy Password-Authenticated Key Exchange in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2018
  • 2018-03-07. Reassessing Security of Randomizable Signatures in TOPICS IN CRYPTOLOGY – CT-RSA 2018
  • 2017-10-20. Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms in INFORMATION SECURITY
  • 2017. Removing the Strong RSA Assumption from Arguments over the Integers in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2017
  • 2017. CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions in PUBLIC-KEY CRYPTOGRAPHY – PKC 2017
  • 2017. Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash in PUBLIC-KEY CRYPTOGRAPHY – PKC 2017
  • 2017. Removing Erasures with Explainable Hash Proof Systems in PUBLIC-KEY CRYPTOGRAPHY – PKC 2017
  • 2016. NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2016
  • 2016. On the (In)Security of SNARKs in the Presence of Oracles in THEORY OF CRYPTOGRAPHY
  • 2016. Encryption Switching Protocols in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2016. FHE Circuit Privacy Almost for Free in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2016. Secure Distributed Computation on Private Inputs in FOUNDATIONS AND PRACTICE OF SECURITY
  • 2016. Short Randomizable Signatures in TOPICS IN CRYPTOLOGY - CT-RSA 2016
  • 2016. Robust Password-Protected Secret Sharing in COMPUTER SECURITY – ESORICS 2016
  • 2015. Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2015. An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2015. Scalable Divisible E-cash in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2015. Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2014. Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2014. Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/2208", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/2208", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "type": "DefinedTerm"
          }
        ], 
        "amount": {
          "currency": "EUR", 
          "type": "MonetaryAmount", 
          "value": "2168261"
        }, 
        "description": "Many companies have already started the migration to the Cloud and many individuals share their personal informations on social networks. Unfortunately, in the current access mode, the provider first authenticates the client, and grants him access, or not, according to his rights in the access-control list. Therefore, the provider itself not only has total access to the data, but also knows which data are accessed, by whom, and how: privacy, which includes secrecy of data (confidentiality), identities (anonymity), and requests (obliviousness), should be enforced.\n\nThe industry of the Cloud introduces a new implicit trust requirement: nobody has any idea at all of where and how his data are stored and manipulated, but everybody should blindly trust the providers. Privacy-compliant procedures cannot be left to the responsibility of the provider: however strong the trustfulness of the provider may be, any system or human vulnerability can be exploited against privacy. This presents too huge a threat to tolerate. The distribution of the data and the secrecy of the actions must be given back to the users. It requires promoting privacy as a global security notion.\n\nA new generation of secure multi-party computation protocols is required to protect everybody in an appropriate way, with privacy and efficiency: interactive protocols will be the core approach to provide privacy in practical systems.\n\nPrivacy for the Cloud will have a huge societal impact since it will revolutionize the trust model: users will be able to make safe use of outsourced storage, namely for personal, financial and medical data, without having to worry about failures or attacks of the server. It will also have a strong economic impact, conferring a competitive advantage on Cloud providers implementing these tools.", 
        "endDate": "2019-05-31T00:00:00Z", 
        "funder": {
          "id": "https://www.grid.ac/institutes/grid.452896.4", 
          "type": "Organization"
        }, 
        "id": "sg:grant.3792429", 
        "identifier": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "3792429"
            ]
          }, 
          {
            "name": "cordis_id", 
            "type": "PropertyValue", 
            "value": [
              "185411"
            ]
          }
        ], 
        "inLanguage": [
          "en"
        ], 
        "keywords": [
          "cloud providers", 
          "industry", 
          "access", 
          "outsourced storage", 
          "providers", 
          "efficiency", 
          "current access mode", 
          "failure", 
          "medical data", 
          "core approach", 
          "right", 
          "data", 
          "strong economic impact", 
          "distribution", 
          "huge societal impact", 
          "users", 
          "competitive advantage", 
          "interactive protocols", 
          "trustfulness", 
          "practical system", 
          "tool", 
          "anonymity", 
          "social networks", 
          "global security notion", 
          "cryptography", 
          "many companies", 
          "request", 
          "trust model", 
          "responsibility", 
          "personal information", 
          "cloud", 
          "clients", 
          "obliviousness", 
          "nobody", 
          "safe use", 
          "privacy", 
          "idea", 
          "human vulnerability", 
          "action", 
          "identity", 
          "migration", 
          "server", 
          "new generation", 
          "threat", 
          "confidentiality", 
          "Privacy-compliant procedures", 
          "system", 
          "new implicit trust requirement", 
          "total access", 
          "secrecy", 
          "everybody", 
          "appropriate way", 
          "access-control list", 
          "secure multi-party computation protocol", 
          "attack", 
          "many individuals"
        ], 
        "name": "Cryptography for the Cloud", 
        "recipient": [
          {
            "id": "https://www.grid.ac/institutes/grid.4444.0", 
            "type": "Organization"
          }, 
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.4444.0", 
              "name": "CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE CNRS", 
              "type": "Organization"
            }, 
            "familyName": "Pointcheval", 
            "givenName": "David Daniel Rene", 
            "id": "sg:person.014622353274.46", 
            "type": "Person"
          }, 
          {
            "member": "sg:person.014622353274.46", 
            "roleName": "PI", 
            "type": "Role"
          }
        ], 
        "sameAs": [
          "https://app.dimensions.ai/details/grant/grant.3792429"
        ], 
        "sdDataset": "grants", 
        "sdDatePublished": "2019-03-07T11:22", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com.uberresearch.data.processor/core_data/20181219_192338/projects/base/cordis_projects_3.xml.gz", 
        "startDate": "2014-06-01T00:00:00Z", 
        "type": "MonetaryGrant", 
        "url": "http://cordis.europa.eu/project/rcn/185411_en.html"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/grant.3792429'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/grant.3792429'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/grant.3792429'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/grant.3792429'


     

    This table displays all metadata directly associated to this object as RDF triples.

    100 TRIPLES      19 PREDICATES      78 URIs      70 LITERALS      5 BLANK NODES

    Subject Predicate Object
    1 sg:grant.3792429 schema:about anzsrc-for:2208
    2 schema:amount N948d06569f33444b9d9c10b483641596
    3 schema:description Many companies have already started the migration to the Cloud and many individuals share their personal informations on social networks. Unfortunately, in the current access mode, the provider first authenticates the client, and grants him access, or not, according to his rights in the access-control list. Therefore, the provider itself not only has total access to the data, but also knows which data are accessed, by whom, and how: privacy, which includes secrecy of data (confidentiality), identities (anonymity), and requests (obliviousness), should be enforced. The industry of the Cloud introduces a new implicit trust requirement: nobody has any idea at all of where and how his data are stored and manipulated, but everybody should blindly trust the providers. Privacy-compliant procedures cannot be left to the responsibility of the provider: however strong the trustfulness of the provider may be, any system or human vulnerability can be exploited against privacy. This presents too huge a threat to tolerate. The distribution of the data and the secrecy of the actions must be given back to the users. It requires promoting privacy as a global security notion. A new generation of secure multi-party computation protocols is required to protect everybody in an appropriate way, with privacy and efficiency: interactive protocols will be the core approach to provide privacy in practical systems. Privacy for the Cloud will have a huge societal impact since it will revolutionize the trust model: users will be able to make safe use of outsourced storage, namely for personal, financial and medical data, without having to worry about failures or attacks of the server. It will also have a strong economic impact, conferring a competitive advantage on Cloud providers implementing these tools.
    4 schema:endDate 2019-05-31T00:00:00Z
    5 schema:funder https://www.grid.ac/institutes/grid.452896.4
    6 schema:identifier N73392418b0ab47b38611a8088d8a23ce
    7 Ne32ed3b2e5854895865e0d858e5ad0ea
    8 schema:inLanguage en
    9 schema:keywords Privacy-compliant procedures
    10 access
    11 access-control list
    12 action
    13 anonymity
    14 appropriate way
    15 attack
    16 clients
    17 cloud
    18 cloud providers
    19 competitive advantage
    20 confidentiality
    21 core approach
    22 cryptography
    23 current access mode
    24 data
    25 distribution
    26 efficiency
    27 everybody
    28 failure
    29 global security notion
    30 huge societal impact
    31 human vulnerability
    32 idea
    33 identity
    34 industry
    35 interactive protocols
    36 many companies
    37 many individuals
    38 medical data
    39 migration
    40 new generation
    41 new implicit trust requirement
    42 nobody
    43 obliviousness
    44 outsourced storage
    45 personal information
    46 practical system
    47 privacy
    48 providers
    49 request
    50 responsibility
    51 right
    52 safe use
    53 secrecy
    54 secure multi-party computation protocol
    55 server
    56 social networks
    57 strong economic impact
    58 system
    59 threat
    60 tool
    61 total access
    62 trust model
    63 trustfulness
    64 users
    65 schema:name Cryptography for the Cloud
    66 schema:recipient Nb19b1b81f14b470a9aab595d8e827faf
    67 sg:person.014622353274.46
    68 https://www.grid.ac/institutes/grid.4444.0
    69 schema:sameAs https://app.dimensions.ai/details/grant/grant.3792429
    70 schema:sdDatePublished 2019-03-07T11:22
    71 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    72 schema:sdPublisher N815c8b527cdf4a67be9277d8afff7522
    73 schema:startDate 2014-06-01T00:00:00Z
    74 schema:url http://cordis.europa.eu/project/rcn/185411_en.html
    75 sgo:license sg:explorer/license/
    76 sgo:sdDataset grants
    77 rdf:type schema:MonetaryGrant
    78 N73392418b0ab47b38611a8088d8a23ce schema:name cordis_id
    79 schema:value 185411
    80 rdf:type schema:PropertyValue
    81 N815c8b527cdf4a67be9277d8afff7522 schema:name Springer Nature - SN SciGraph project
    82 rdf:type schema:Organization
    83 N948d06569f33444b9d9c10b483641596 schema:currency EUR
    84 schema:value 2168261
    85 rdf:type schema:MonetaryAmount
    86 Nb19b1b81f14b470a9aab595d8e827faf schema:member sg:person.014622353274.46
    87 schema:roleName PI
    88 rdf:type schema:Role
    89 Ne32ed3b2e5854895865e0d858e5ad0ea schema:name dimensions_id
    90 schema:value 3792429
    91 rdf:type schema:PropertyValue
    92 anzsrc-for:2208 schema:inDefinedTermSet anzsrc-for:
    93 rdf:type schema:DefinedTerm
    94 sg:person.014622353274.46 schema:affiliation https://www.grid.ac/institutes/grid.4444.0
    95 schema:familyName Pointcheval
    96 schema:givenName David Daniel Rene
    97 rdf:type schema:Person
    98 https://www.grid.ac/institutes/grid.4444.0 schema:name CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE CNRS
    99 rdf:type schema:Organization
    100 https://www.grid.ac/institutes/grid.452896.4 schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...