Crypto 17 1 THÈSE DE DOCTORAT CONJOINT TELECOM SUDPARIS et L ? UNIVERSITE PIERRE ET MARIE CURIE Spécialité Informatique et Réseaux École doctorale Informatique Télécommunications et Electronique de Paris Présentée par Nesrine KAANICHE Pour obtenir le grad
THÈSE DE DOCTORAT CONJOINT TELECOM SUDPARIS et L ? UNIVERSITE PIERRE ET MARIE CURIE Spécialité Informatique et Réseaux École doctorale Informatique Télécommunications et Electronique de Paris Présentée par Nesrine KAANICHE Pour obtenir le grade de DOCTEUR DE TELECOM SUDPARIS La sécurité des données stockées dans un environnement Cloud basée sur des mécanismes cryptographiques Soutenue le Décembre devant le jury composé de Christophe BIDAN Professeur Supélec France ?? Rapporteur Sébastien CANARD Ingénieur de recherche Orange Labs France ?? Rapporteur Georg CARLE Professeur Technische Universit? t München Allemagne ?? Examinateur Thierry COUPAYE Directeur de recherche Orange Labs France ?? Examinateur Yves ROUDIER Ma? tre de conférences EURECOM France ?? Examinateur Pierre SENS Professeur Université Pierre et Marie Curie France ?? Examinateur Maryline LAURENT Professeur Télécom SudParis France ?? Directrice de thèse Thèse No TELE C CPHD THESIS TELECOM SUDPARIS IN PARTNERSHIP WITH PIERRE ET MARIE CURIE UNIVERSITY Speciality Informatics and Networks Doctoral School Informatique Télécommunications et Électronique de Paris Presented by Nesrine KAANICHE To obtain the degree of DOCTOR OF TELECOM SUDPARIS Cloud Data Storage Security based on Cryptographic Mechanisms Presented on December th with the Jury composed by Christophe BIDAN Professor Supélec France ?? Reporter Sébastien CANARD Researcher Orange Labs France ?? Reporter Georg CARLE Professor Technische Universit? t München Germany ??Examiner Thierry COUPAYE Research Director Orange Labs France ?? Examiner Yves ROUDIER Associate Professor EURECOM France ?? Examiner Pierre SENS Professor Université Pierre et Marie Curie France ?? Examiner Maryline Laurent Professor Télécom SudParis France ?? Thesis Director Thesis No TELE C CDedicated to Chrif for reasons i CABSTRACT ii CAbstract Recent technological advances have given rise to the popularity and success of cloud This new paradigm is gaining an expanding interest since it provides cost e ?cient architectures that support the transmission storage and intensive computing of data However these promising storage services bring many challenging design issues considerably due to the loss of data control These challenges namely data con ?dentiality and data integrity have signi ?cant in uence on the security and performances of the cloud system Some threat models assume that the cloud service provider cannot be trusted and therefore security designers propose a high level security assurance such as storing encrypted data in cloud servers Others suppose that cloud providers can be trusted and that potential threats come primarily from outside attackers and other malicious cloud users Furthermore a cloud user can never deny a potential server breakdown Therefore there are several challenges that need to be addressed with respect to security and privacy in a cloud context This thesis aims at overcoming this trade-o ? while considering two data security concerns On one hand we focus on data con ?dentiality preservation which becomes more complex with exible data sharing among a dynamic group of users It requires the secrecy of outsourced data and an e ?cient sharing of decrypting keys between di ?erent authorized users For this purpose we ?rst proposed a new method relying on the use of ID-Based Cryptography IBC where each
Documents similaires
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/M6xraRoGaeeIIyAEEUuPqLfW26lmMqE9V1Cx0SLtHbGMBt4p8AB9GslaMDMojZZde52vAEuclcNuIrhTWVjUXq8w.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/cCaqMtYNTTxR4Ze3FukVcG2DdzIU27iqyuvl0JTaXMhericj1LRChBVBFnpYTXMxEBFQnMdIAG5dfFJYKheo5sjj.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/117033509953ic0v47zsbhson4wscjte8gzsdgi4ijb0zzkpef0z0gvui5bcxwpehlvzjlj9fk2egfnrbq3uozeebvlsimkovo0wde78l91yp7u.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/11703057598x2wnxmpu4xogfig8mvkqgirjndyhivt8qv0qia8fzcgk4pfnne1qvepgyaqjzy58ksqkzzouqceufbxccorqx5p7jzr022l1nm5b.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/UGPwVMYWvTymC1QouBG7OPBWfRsWbUGvznq1PUOM1ILKETLS1vvwx1P7J5HIk2ceyiYw1165YVuIq8QBRrN3XbSY.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/11703328969tjn01r4klkzlukfpa9zxwxc2cgiaseijkagi7mknwl03gh6jz1p2kzxah5vcncra7sztvpra6jfwpimwxd1okc8vktwgg8yi08it.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/11703216577i5qyuoqiqcdfwtkg1ktvchsqo8qljvqxwgmyojxyhojfeeqvciaxinxkmghwyuezf3953s2qxhj5watxenndqapfxthsq1unttlf.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/11703263747kozjlareh84th32vx3ew9aue1j885d8bj4a6bfnh8utgyc0gylpmvfwjly0uxq9mitm4qqnwhw7lpsqna94c51zcgy5vihbhf5od.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/XlxTizRhuDyjvpgl3bah0fypYnqdGc4bRx6DAvnwAPuxZVe4y5ivB4Hnca37NxptIQS3VI73217gIXZc8UbKqHGP.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/117033527525acw7pgqihvlfbt80fdvh3obfweorwapibon7joqotdo5iqsxacjvekn5hzzsxfpwodyhcz9pplalb4ckjfysb0xqh0p2ahorcsp.png)
-
24
-
0
-
0
Licence et utilisation
Gratuit pour un usage personnel Aucune attribution requise- Détails
- Publié le Oct 28, 2022
- Catégorie Literature / Litté...
- Langue French
- Taille du fichier 690.9kB