Versatile Key Management for Secure Cloud Storage

被引:3
|
作者
Graf, Sebastian [1 ]
Lang, Patrick [1 ]
Hohenadel, Stefan A. [2 ]
Waldvogel, Marcel [1 ]
机构
[1] Univ Konstanz, Distributed Syst Grp, Constance, Germany
[2] Univ Konstanz, Constance, Germany
关键词
D O I
10.1109/SRDS.2012.80
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Not only does storing data in the cloud utilize specialized infrastructures facilitating immense scalability and high availability, but it also offers a convenient way to share any information with user-defined third-parties. However, storing data on the infrastructure of commercial third party providers, demands trust and confidence. Simple approaches, like merely encrypting the data by providing encryption keys, which at most consist of a shared secret supporting rudimentary data sharing, do not support evolving sets of accessing clients to common data. Based on approaches from the area of stream-encryption, we propose an adaption for enabling scalable and flexible key management within heterogeneous environments like cloud scenarios. Representing access-rights as a graph, we distinguish between the keys used for encrypting hierarchical data and the encrypted updates on the keys enabling flexible join-/leave-operations of clients. This distinction allows us to utilize the high availability of the cloud as updating mechanism without harming confidentiality. Our graph-based key management results in an adaption of nodes related to the changed key. The updates on the keys again continuously create an overhead related to the number of these updated nodes. The proposed scalable approach utilizes cloud-based infrastructures for confidential data and key sharing in collaborative workflows supporting variable client-sets.
引用
收藏
页码:469 / 474
页数:6
相关论文
共 50 条
  • [21] Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
    Yu, Jia
    Wang, Huaqun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1931 - 1940
  • [22] Key management and key distribution for secure group communication in mobile and cloud network
    Vijayakumar, P.
    Chang, Victor
    Deborah, L. Jegatha
    Kshatriya, Bharat S. Rawal
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 123 - 125
  • [23] An Efficient and Versatile Key Management Protocol for Secure Smart Grid Communications
    Kim, Jung-Yoon
    Choi, Hyoung-Kee
    2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012, : 1823 - 1828
  • [24] TwinCloud: Secure Cloud Sharing Without Explicit Key Management
    Bicakci, Kemal
    Yavuz, Davut Deniz
    Gurkan, Sezin
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 581 - 585
  • [25] Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage
    Liu, Xueqiao
    Yang, Guomin
    Susilo, Willy
    Tonien, Joseph
    Chen, Rongmao
    Lv, Xixiang
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (03) : 1664 - 1677
  • [26] Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management
    Lee, Mira
    Seo, Minhye
    APPLIED SCIENCES-BASEL, 2023, 13 (24):
  • [27] Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage
    Hur, Junbeom
    Koo, Dongyoung
    Shin, Youngjoo
    Kang, Kyungtae
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (11) : 3113 - 3125
  • [28] Secure auditing and deduplication with efficient ownership management for cloud storage
    Wang, Min
    Xu, Lujun
    Hao, Rong
    Yang, Ming
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [29] Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage
    Ma, Hua
    Tian, Guohua
    Liu, Zhenhua
    Zhang, Linchao
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 168 - 176
  • [30] Key Management for Cloud Data Storage: Methods and Comparisons
    Buchade, Amar R.
    Ingle, Rajesh
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 263 - 270