ABSTRACT
Identication (Olden, 2011) is apparently the cornerstone in the general cloud architecture (Figure 12.1). Owing to all shared nature in the cloud paradigm, information isolation
CONTENTS 12.1 Introduction 179 12.2 K-Anonymity for Identity and Privacy 180 12.3 Elliptic Curve for Ecient Key 182 12.4 Homomorphic for Encryption Arithmetic 184 12.5 Checklists for Encryption, Security, and Privacy 186
12.5.1 Soware Isolation 186 12.5.2 Hypervisor Complexity 187 12.5.3 Data Protection 187 12.5.4 Data Sanitization 187 12.5.5 Availability 188 12.5.6 Value Concentration 188
12.6 Summary 189 References 190
and privacy are key concerns to cloud operators and users. In this chapter, various identity management and encryption approaches are examined to elaborate the value contribution to the general cloud ecosystem.