Versatile Key Management for Secure Cloud Storage

被引:3
|
作者
Graf, Sebastian [1 ]
Lang, Patrick [1 ]
Hohenadel, Stefan A. [2 ]
Waldvogel, Marcel [1 ]
机构
[1] Univ Konstanz, Distributed Syst Grp, Constance, Germany
[2] Univ Konstanz, Constance, Germany
关键词
D O I
10.1109/SRDS.2012.80
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Not only does storing data in the cloud utilize specialized infrastructures facilitating immense scalability and high availability, but it also offers a convenient way to share any information with user-defined third-parties. However, storing data on the infrastructure of commercial third party providers, demands trust and confidence. Simple approaches, like merely encrypting the data by providing encryption keys, which at most consist of a shared secret supporting rudimentary data sharing, do not support evolving sets of accessing clients to common data. Based on approaches from the area of stream-encryption, we propose an adaption for enabling scalable and flexible key management within heterogeneous environments like cloud scenarios. Representing access-rights as a graph, we distinguish between the keys used for encrypting hierarchical data and the encrypted updates on the keys enabling flexible join-/leave-operations of clients. This distinction allows us to utilize the high availability of the cloud as updating mechanism without harming confidentiality. Our graph-based key management results in an adaption of nodes related to the changed key. The updates on the keys again continuously create an overhead related to the number of these updated nodes. The proposed scalable approach utilizes cloud-based infrastructures for confidential data and key sharing in collaborative workflows supporting variable client-sets.
引用
收藏
页码:469 / 474
页数:6
相关论文
共 50 条
  • [31] Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage
    Zeng, Ming
    Qian, Haifeng
    Chen, Jie
    Zhang, Kai
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 426 - 438
  • [32] Construction of Key-dependent S-box for Secure Cloud Storage
    Indumathi, A.
    Sumathi, G.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (03): : 1509 - 1524
  • [33] Secure Encrypted Data Deduplication for Cloud Storage against Compromised Key Servers
    Zhang, Yuan
    Xu, Chunxiang
    Cheng, Nan
    Shen, Xuemin
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [34] Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems
    Zhang, Yuan
    Xu, Chunxiang
    Cheng, Nan
    Shen, Xuemin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2789 - 2806
  • [35] dualDup: A secure and reliable cloud storage framework to deduplicate the encrypted data and key
    Chouhan, Vikas
    Peddoju, Sateesh K.
    Buyya, Rajkumar
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [36] A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
    Sriprasadh, K.
    Saicharansrinivasan
    Pandithurai, O.
    Saravanan, A.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 305 - 311
  • [37] A Study of Key management Protocol for Secure Communication in Personal Cloud Environment
    Jin, ByungWook
    Lee, Keun-Wang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 51 - 58
  • [38] Secure Personal Cloud Storage
    Mar, Kheng Kok
    Law, Chee Yong
    Chin, Victoria
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 108 - 113
  • [39] A Study of Key management Protocol for Secure Communication in Personal Cloud Environment
    Jin, ByungWook
    Lee, Keun-Wang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 303 - 310
  • [40] Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
    Li, Wei
    Li, Xuelian
    Gao, Juntao
    Wang, Haiyu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1276 - 1290