to be send to each participant. In other words, n, t
and the size of each sent data have to be carefully
chosen depending on the capacity of the interCloud
system. For example, for a fixed value of n, when
t increases the number of communications between
the cloud providers increases but the risk of coalition
between cloud providers (in order to break the user
confidentiality) is reduced.
However, the purposes of our third protocol are
twofold. The client uses cryptographic keys with-
out having to hold them locally. Moreover the cloud
provider cannot retrieve client’s information alone.
Indeed the cloud providers retain only incomplete
data.
We may assume the use of true random val-
ues when generating cryptographic keys in order to
achieve the highest level of security in this matter.
Moreover considering the specific context of cloud
computing, given the significant available comput-
ing power as well as the potential massive use of
random numbers, it is reasonable to target a higher
level of security in order to be protected against at-
tacks (Goldberg and Wagner, 1996; Woolley et al.,
2008; Garfinkel and Rosenblum, 2005; Ristenpart and
Yilek, 2010). Finally, we propose to use a fast random
number generator for performance reason and a true
random number generator for security reason.
The main issue is to know how to chose the t hon-
est cloud providers to decrypt a data. There are not yet
solution to find who are the dishonest cloud providers.
Future work will focus on this interesting issue.
REFERENCES
Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz,
R., Konwinski, A., Lee, G., Patterson, D., Rabkin,
A., Stoica, I., and Zaharia, M. (2009). Above the
clouds: A berkeley view of cloud computing. Tech-
nical report, EECS Department, University of Califor-
nia, Berkeley.
Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., and
Morrow, M. (2009). Blueprint for the intercloud - pro-
tocols and formats for cloud computing interoperabil-
ity. In ICIW, pages 328–336. IEEE Computer Society.
Buyya, R., Ranjan, R., and Calheiros, R. N. (2010). Inter-
cloud: Utility-oriented federation of cloud computing
environments for scaling of application services. In
Hsu, C.-H., Yang, L. T., Park, J. H., and Yeo, S.-S.,
editors, ICA3PP, volume 6081 of LNCS, pages 13–31.
Springer.
Catteddu, D. and Hogben, G. (2009). Cloud computing:
benefits, risks and recommendations for information
security. Technical report, ENISA.
Celesti, A., Tusa, F., Villari, M., and Puliafito, A. (2010).
How to enhance cloud architectures to enable cross-
federation. In International Conference on Cloud
Computing, CLOUD ’10, pages 337–345. IEEE Com-
puter Society.
Garfinkel, T. and Rosenblum, M. (2005). When virtual is
harder than real: security challenges in virtual ma-
chine based computing environments. In Conference
on Hot Topics in Operating Systems, volume 10 of
HOTOS’05, pages 20–20. USENIX Association.
Geater, J. (2011). Comment: Key management strate-
gies in the cloud’. http://www.infosecurity-
magazine.com/view/18818/comment-key-
management-strategies-in-the-cloud.
Gellman, R. (2009). Privacy in the clouds : Risks to pri-
vacy and confidentiality from cloud. Violence Against
Women, pages 1–26.
Goldberg, I. and Wagner, D. (1996). Randomness and
the netscape browser. In International Conference on
Template Production. Dr. Dobb’s Journal.
Hogben, G. (July 2009). Privacy, Security and Identity in
the Cloud. ENISA.
Kandukuri, B., Paturi, R., and Rakshit, A. (2009). Cloud se-
curity issues. In International Conference on Services
Computing, SCC’09, pages 517–520. IEEE Computer
Society.
Kelly, K.(2007). http://www.kk.org/thetechnium/archives/2
007/11/a
cloudbook for.php.
Mather, T., Kumaraswamy, S., and Latif, S. (2009). Cloud
Security and Privacy: An Enterprise Perspective on
Risk and Compliance. O’Reilly.
Ristenpart, T., Tromer, E., Shacham, H., and Savage, S.
(2009). Hey, you, get off of my cloud: exploring in-
formation leakage in third-party compute clouds. In
Conference on Computer and Communications Secu-
rity, pages 199–212. ACM.
Ristenpart, T. and Yilek, S. (2010). When good random-
ness goes bad: Virtual machine reset vulnerabilities
and hedging deployed cryptography. In NDSS. The
Internet Society.
Rocha, F. and Correia, M. (2011). Lucy in the sky with-
out diamonds: Stealing confidential data in the cloud.
In International Conference on Dependable Systems
and Networks Workshops, DSNW’11, pages 129–134.
IEEE Computer Society.
Shamir, A. (1979). How to share a secret. Commun. ACM,
22(11):612–613.
Sogeti (2009). Cloud computing - etat de l’art.
Squicciarini, A., Sundareswaran, S., and Lin, D. (2010).
Preventing information leakage from indexing in the
cloud. In CLOUD, pages 188–195. IEEE.
Syntec informatique (2010). Le livre blanc du cloud
computing - tout ce que vous devez savoir sur
l’informatique dans les nuage.
Urquhart, J. (7 Jan. 2009). The Biggest Cloud-Computing
Issue of 2009 is Trust. C-Net News.
Woolley, R., Murray, M., Dounin, M., and Ermilov, R.
(2008). arc4random predictable sequence vulnera-
bility. http://security.freebsd.org/advisories/FreeBSD-
SA-08:11.arc4random.asc.
KeyManagementasaService
281