Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption Outsourcing

被引:0
|
作者
Alasmari, Sultan [1 ]
Wang, Weichao [1 ]
Qin, Tuanfa [2 ]
Wang, Yu [3 ]
机构
[1] UNC Charlotte, SIS Dept, Charlotte, NC 28223 USA
[2] Guangxi Univ, Multimedia Key Lab, Nanning, Peoples R China
[3] Temple Univ, CIS Dept, Philadelphia, PA 19122 USA
关键词
D O I
10.1109/dsc47296.2019.8937713
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
dWith the popularity of cloud and edge computing, various types of service level agreement (SLA) are used to enforce the amount of resources that service providers commit to end users. However, the security SLAs (SSLA) are usually hard to verify since their execution results are related to the intensity and frequency of cyber attacks. In this paper, we investigate the proof of encryption problem. Restricted by available resources and hardware capabilities, some end users need to outsource the strong encryption operations of data to external service providers. Verification of the correct execution of encryption is a problem since it is directly related to data safety. We first define the expected properties of the Proof of Encryption (PoE) mechanisms. We propose two mechanisms based on whether or not the service requester is aware of the encryption key. They allow an end user to verify that corresponding encryption algorithm and key strength are honored. We describe the details of the verification procedures. Simulation and experiments show that our approaches can detect a dishonest service provider with high probability.
引用
收藏
页码:211 / 218
页数:8
相关论文
共 50 条
  • [1] Automated Security Proof for Symmetric Encryption Modes
    Gagne, Martin
    Lafourcade, Pascal
    Lakhnech, Yassine
    Safavi-Naini, Reihaneh
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2009: INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5913 : 39 - +
  • [2] A Mechanized Proof of Security for Searchable Symmetric Encryption
    Petcher, Adam
    Morrisett, Greg
    [J]. 2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 481 - 494
  • [3] Security enforcement on RFX storage - A selective encryption approach
    Senthilkumar, Radha
    Gayathri, B.
    Kannan, A.
    [J]. ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 689 - +
  • [4] Enterprise Level Security with Homomorphic Encryption
    Foltz, Kevin
    Simpson, William R.
    [J]. ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 1, 2017, : 177 - 184
  • [5] Security Service Level Agreement Measurement in Cloud: A Proof of Concept Implementation
    Dogra, Himanshu
    Verma, Sudhakar
    Hubballi, Neminath
    Swarnkar, Mayank
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2017,
  • [6] Encryption as a Service for Data Healthcare Cloud Security
    El Bouchti, Abdelali
    Bahsani, Samir
    Nahhal, Tank
    [J]. 2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 48 - 54
  • [7] Encryption and security: the advanced encryption standard
    Allman, S
    [J]. EDN, 2002, 47 (24) : 26 - +
  • [8] Security Models and Proof Strategies for Plaintext-Aware Encryption
    James Birkett
    Alexander W. Dent
    [J]. Journal of Cryptology, 2014, 27 : 139 - 180
  • [9] A Note on the Security Proof of Waters Identity-Based Encryption
    Hui, Jianbin
    Wang, Huaixi
    [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL III, 2010, : 420 - 423
  • [10] Service level agreement enforcement for differentiated services
    Rogerio Pereira, Paulo
    [J]. WIRELESS SYSTEMS AND NETWORK ARCHITECTURES IN NEXT GENERATION INTERNET, 2006, 3883 : 158 - 169