A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
A Survey of : Securing Cloud Data under Key Exposure
2018
International Journal of Advanced Trends in Computer Science and Engineering
Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys, by means of coercion or backdoors in cryptographic software. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the attacker's access to the cipher text. This may be achieved, for example, by spreading cipher text blocks across servers in multiple administrative domains-thus assuming that the adversary cannot compromise all of them.
doi:10.30534/ijatcse/2018/01732018
fatcat:zjwvk5ceabfffmgufw6jwyqriq