Versatile Key Management for Secure Cloud Storage

被引:3
|
作者
Graf, Sebastian [1 ]
Lang, Patrick [1 ]
Hohenadel, Stefan A. [2 ]
Waldvogel, Marcel [1 ]
机构
[1] Univ Konstanz, Distributed Syst Grp, Constance, Germany
[2] Univ Konstanz, Constance, Germany
关键词
D O I
10.1109/SRDS.2012.80
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Not only does storing data in the cloud utilize specialized infrastructures facilitating immense scalability and high availability, but it also offers a convenient way to share any information with user-defined third-parties. However, storing data on the infrastructure of commercial third party providers, demands trust and confidence. Simple approaches, like merely encrypting the data by providing encryption keys, which at most consist of a shared secret supporting rudimentary data sharing, do not support evolving sets of accessing clients to common data. Based on approaches from the area of stream-encryption, we propose an adaption for enabling scalable and flexible key management within heterogeneous environments like cloud scenarios. Representing access-rights as a graph, we distinguish between the keys used for encrypting hierarchical data and the encrypted updates on the keys enabling flexible join-/leave-operations of clients. This distinction allows us to utilize the high availability of the cloud as updating mechanism without harming confidentiality. Our graph-based key management results in an adaption of nodes related to the changed key. The updates on the keys again continuously create an overhead related to the number of these updated nodes. The proposed scalable approach utilizes cloud-based infrastructures for confidential data and key sharing in collaborative workflows supporting variable client-sets.
引用
收藏
页码:469 / 474
页数:6
相关论文
共 50 条
  • [1] Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage
    Kwon, Hyunsoo
    Hahn, Changhee
    Koo, Dongyoung
    Hur, Junbeom
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 391 - 398
  • [2] Secure Key Storage and Access Delegation Through Cloud Storage
    Mishra, Bharati
    Jena, Debasish
    Somula, Ramasubbareddy
    Sankar, S.
    INTERNATIONAL JOURNAL OF KNOWLEDGE AND SYSTEMS SCIENCE, 2020, 11 (04) : 45 - 64
  • [3] Secure cloud storage with anonymous deduplication using ID-based key management
    Gharib, Mohammed
    Fazli, MohammadAmin
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (02): : 2356 - 2382
  • [4] Secure cloud storage with anonymous deduplication using ID-based key management
    Mohammed Gharib
    MohammadAmin Fazli
    The Journal of Supercomputing, 2023, 79 : 2356 - 2382
  • [5] On the Suitability of Using SGX for Secure Key Storage in the Cloud
    Brorsson, Joakim
    Bideh, Pegah Nikbakht
    Nilsson, Alexander
    Hell, Martin
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2020, 2020, 12395 : 32 - 47
  • [6] Secure Hierarchical Key Management for Cloud Computing
    Liu, Jin
    Sun, Jing
    Yow, Kin-Choong
    Peng, Xian-Bin
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 399 - 405
  • [7] Secure Management of Key Distribution in Cloud Scenarios
    Cui, Zongmin
    Zhu, Hong
    Yu, Jing
    2014 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTERNET OF THINGS (CCIOT), 2014, : 18 - 21
  • [8] An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage
    Ahmad, Shahnawaz
    Mehfuz, Shabana
    Beg, Javed
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23):
  • [9] Secure Data Deduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage
    Vignesh, R.
    Preethi, J.
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (04): : 811 - 825
  • [10] An Efficient Key-versatile Kdm-secure Storage Scheme
    Ying, Chenglong
    Liu, Shengli
    Han, Shuai
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING APPLICATIONS (CSEA 2015), 2015, : 319 - 324