CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems

被引:2
|
作者
Bracciale, Lorenzo [1 ]
Loreti, Pierpaolo [1 ]
Raso, Emanuele [1 ]
Naldi, Maurizio [2 ]
Bianchi, Giuseppe [1 ]
机构
[1] Univ Roma Tor Vergata, Dept Elect Engn, Rome, Italy
[2] Univ Roma Tor Vergata, Dept Comp Sci & Civil Engn, Rome, Italy
基金
欧盟地平线“2020”;
关键词
Cloud Computing; Security; Pedersen Key Distribution; Shamir Secret Sharing; ISSUES; PRIVACY;
D O I
10.5220/0008921603610368
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptography key management system plays a very central role in the cloud data security. Nonetheless, a great part of the current commercial solutions rely on cloud providers that hold both the encrypted data and the related private master key of their served customers in their secure key vaults, having a de-facto total control on their customer digital assets. Conversely, entrusting customer companies for key holding can be dangerous as witnessed by many cases of key loss or theft. In this work we present CoProtect, a novel architecture to protect the cryptography keys in cloud systems that leverage on the cooperation between the cloud provider and the customer company. With such trust model, we present the proposed data management strategy, the key generation and the crypto procedures, and a proof of concept.
引用
收藏
页码:361 / 368
页数:8
相关论文
共 50 条
  • [1] Management of Symmetric Cryptographic Keys in Cloud Based Environment
    Fakhar, Faiza
    Shibli, Muhammad Awais
    [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 39 - 44
  • [2] LIFETIMES OF KEYS IN CRYPTOGRAPHIC KEY MANAGEMENT-SYSTEMS
    OKAMOTO, E
    NAKAMURA, K
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 246 - 259
  • [3] On replacing cryptographic keys in hierarchical key management systems
    Kayem, Anne
    Akl, Selim
    Martin, Patrick
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (03) : 289 - 309
  • [4] Securing Cryptographic Keys in the Cloud: A Survey
    AlBelooshi, Bushra
    Damiani, Ernesto
    Salah, Khaled
    Martin, Thomas
    [J]. IEEE CLOUD COMPUTING, 2016, 3 (04): : 42 - +
  • [5] Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems
    Kim, Byeori
    Choi, Minseong
    Youn, Taek-Young
    Yi, Jeong Hyun
    Cho, Haehyun
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (03): : 3725 - 3742
  • [6] Security of biased sources for cryptographic keys
    Mihailescu, P
    [J]. CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 287 - 302
  • [7] Intelligent Management of the Cryptographic Keys
    Moise, G.
    Cangea, O.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011, 6 (01) : 150 - 157
  • [8] Securing Cryptographic Keys in the IaaS Cloud Model
    AlBelooshi, B.
    Salah, K.
    Martin, T.
    Damiani, E.
    [J]. 2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, : 397 - 401
  • [9] A Scattering Technique for Protecting Cryptographic Keys in the Cloud
    Mohamed, Fatma
    AlBelooshi, Bushra
    Salah, Khaled
    Yeun, Chan Yeob
    Damiani, Ernesto
    [J]. 2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 301 - 306
  • [10] Direct visualization of cryptographic keys for enhanced security
    Lobachev, Oleg
    [J]. VISUAL COMPUTER, 2018, 34 (12): : 1749 - 1759