Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption Outsourcing

被引:0
|
作者
Alasmari, Sultan [1 ]
Wang, Weichao [1 ]
Qin, Tuanfa [2 ]
Wang, Yu [3 ]
机构
[1] UNC Charlotte, SIS Dept, Charlotte, NC 28223 USA
[2] Guangxi Univ, Multimedia Key Lab, Nanning, Peoples R China
[3] Temple Univ, CIS Dept, Philadelphia, PA 19122 USA
关键词
D O I
10.1109/dsc47296.2019.8937713
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
dWith the popularity of cloud and edge computing, various types of service level agreement (SLA) are used to enforce the amount of resources that service providers commit to end users. However, the security SLAs (SSLA) are usually hard to verify since their execution results are related to the intensity and frequency of cyber attacks. In this paper, we investigate the proof of encryption problem. Restricted by available resources and hardware capabilities, some end users need to outsource the strong encryption operations of data to external service providers. Verification of the correct execution of encryption is a problem since it is directly related to data safety. We first define the expected properties of the Proof of Encryption (PoE) mechanisms. We propose two mechanisms based on whether or not the service requester is aware of the encryption key. They allow an end user to verify that corresponding encryption algorithm and key strength are honored. We describe the details of the verification procedures. Simulation and experiments show that our approaches can detect a dishonest service provider with high probability.
引用
收藏
页码:211 / 218
页数:8
相关论文
共 50 条
  • [21] Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
    Iwamoto, Mitsugu
    Ohta, Kazuo
    Shikata, Junji
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (01) : 654 - 685
  • [22] A New Ultra Lightweight Encryption Design for Security at Node Level
    Bansod, Gaurav
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 111 - 128
  • [23] A New Design of NTRU Encryption with High Security and Performance Level
    Yassein, Hassan R.
    Abidalzahra, Asia A.
    Al-Saidi, Nadia M.
    [J]. FOURTH INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2020), 2021, 2334
  • [24] An Application to ensure Security through Bit-level Encryption
    Ghosh, Mrinmoy
    Paul, Pranam
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (11): : 228 - 233
  • [25] Database Security with AES Encryption, Elliptic Curve Encryption and Signature
    Zaw, Than Myo
    Thant, Min
    Bezzateev, S., V
    [J]. 2019 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2019,
  • [26] A Comparative Experiment of Document Security Level on Parallel Encryption With Digit Arithmetic of Covertext and Parallel Encryption using Covertext
    Ardhianto, Eka
    Budiharto, Widodo
    Heryadi, Yaya
    Wulandhari, Lili Ayu
    [J]. 19TH IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED 2021), 2021, : 163 - 167
  • [27] Delegation model for enforcement of on-demand service level agreement
    Zhou, Y
    Zhao, Q
    Perry, M
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS: I, 2004, : 330 - 337
  • [28] Accountable Security Mechanism Based on Security Service Level Agreement
    Takahashi, Takeshi
    Kannisto, Joona
    Harju, Jarmo
    Heikkinen, Seppo
    Helenius, Marko
    Matsuo, Shin'ichiro
    Silverajan, Bilhanan
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [29] Security and Encryption at Modern Databases
    Ocenas, Martin
    Homoliak, Ivan
    Hanacek, Petr
    Malinka, Kamil
    [J]. 2020 4TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2020), 2020, : 19 - 23
  • [30] On the security of image encryption method
    Jan, JK
    Tseng, YM
    [J]. INFORMATION PROCESSING LETTERS, 1996, 60 (05) : 261 - 265