SECURING CLOUD DATA UNDER KEY EXPOSURE

SECURING CLOUD DATA UNDER KEY EXPOSURE    ABSTRACT: Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys, by means of coercion or backdoors in cryptographic software. ¢ Once the encryption key is exposed, the only...