Project/Area Number |
15K16006
|
Research Category |
Grant-in-Aid for Young Scientists (B)
|
Allocation Type | Multi-year Fund |
Research Field |
Information security
|
Research Institution | National Institute of Advanced Industrial Science and Technology |
Principal Investigator |
SCHULDT Jacob 国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 主任研究員 (80750893)
|
Research Collaborator |
PATERSON Kenneth University of London, Royal Holloway
DEGABRIELE Jean Paul University of London, Royal Holloway
WOODAGE Joanne University of London, Royal Holloway
WEE Hoeteck Ecole Normale Superieure
MATSUDA Takahiro National Institute of Industrial Science and Technology(AIST), Advanced Cryptosystems Research Group
HANAOKA Goichiro National Institute of Industrial Science and Technology(AIST), Advanced Cryptosystems Research Group
MORITA Hiraku National Institute of Industrial Science and Technology(AIST), Advanced Cryptosystems Research Group
IWATA Tetsu Nagoya University, Department of Computational Science and Engineering
|
Project Period (FY) |
2015-04-01 – 2018-03-31
|
Project Status |
Completed (Fiscal Year 2017)
|
Budget Amount *help |
¥3,900,000 (Direct Cost: ¥3,000,000、Indirect Cost: ¥900,000)
Fiscal Year 2017: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2016: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2015: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
|
Keywords | public key encryption / signatures / related randomness / related key attacks / NIKE / encryption / cloud security / related key security |
Outline of Final Research Achievements |
The advantages provided by the cloud computing paradigm have led to a rapid adaptation, and a large number of cloud-based systems and services are in use today. However, recent results illustrate that the standard approach to securing these systems is insufficient due to the unique properties of a cloud-based environment, and attacks on real-world implementations have been demonstrated. This research develops encryption and authentication mechanisms, which are central to the construction of practical security systems, that address security concerns in a cloud-based system. Specifically, the focus is on security using weak or maliciously manipulated randomness and security against leakage and tampering attacks, which are relevant for both virtual machines providing a cloud service and the devices accessing this service.
|