"Disguising Access Patterns to Protect Sensitive Data in the Cloud"

Sensitive data stored in the cloud can be encrypted, but the way in which it is accessed by users can still leave it vulnerable to hackers. Wensheng Zhang, an associate professor of computer science at Iowa State University highlights the possibility of observing cloud storage access patterns to deduce the value of data and determine what parts of the file should be prioritized in the process of cracking. As a result, researchers are developing techniques to disguise access patterns in order to secure sensitive data stored in the cloud. This article continues to discuss access pattern-based attacks on cloud storage and the ongoing development of solutions.  

Iowa State University reports "Disguising Access Patterns to Protect Sensitive Data in the Cloud"

Submitted by Anonymous on