ABSTRACT

Identication (Olden, 2011) is apparently the cornerstone in the general cloud architecture (Figure 12.1). Owing to all shared nature in the cloud paradigm, information isolation

CONTENTS 12.1 Introduction 179 12.2 K-Anonymity for Identity and Privacy 180 12.3 Elliptic Curve for Ecient Key 182 12.4 Homomorphic for Encryption Arithmetic 184 12.5 Checklists for Encryption, Security, and Privacy 186

12.5.1 Soware Isolation 186 12.5.2 Hypervisor Complexity 187 12.5.3 Data Protection 187 12.5.4 Data Sanitization 187 12.5.5 Availability 188 12.5.6 Value Concentration 188

12.6 Summary 189 References 190

and privacy are key concerns to cloud operators and users. In this chapter, various identity management and encryption approaches are examined to elaborate the value contribution to the general cloud ecosystem.