IJPAM: Volume 85, No. 1 (2013)

CLOUD CRYPTOGRAPHY

Kelsey Rauber
Mathematics Department
New York City College of Technology
300, Jay Street, Brooklyn, NY 11201, USA


Abstract. As kids we often wonder what it would feel like to touch a cloud, play on it, maybe even build a living environment on it. We now have found a way to step into it: cloud computing! To a kid, this statement might evoke false imagery, but to scientists all over the world, we are a step closer to making the impossible possible. Cloud computing is what we are talking about. What will it offer, how will we use it? How is it being used right now?

This paper focuses on the key element with whose absent the entire system could fall apart: Security! What are the main components that need to be secured? How will cloud computing revolutionize our computer experience? Where do Security-As-A-Service, Homomorphic Encryption and Functional Encryption fit in? How do they work and how will they keep our information secure?

Received: March 30, 2012

AMS Subject Classification: 94

Key Words and Phrases: cloud cryptography

Download paper from here.



DOI: 10.12732/ijpam.v85i1.1 How to cite this paper?
Source:
International Journal of Pure and Applied Mathematics
ISSN printed version: 1311-8080
ISSN on-line version: 1314-3395
Year: 2013
Volume: 85
Issue: 1