Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption Outsourcing

被引:0
|
作者
Alasmari, Sultan [1 ]
Wang, Weichao [1 ]
Qin, Tuanfa [2 ]
Wang, Yu [3 ]
机构
[1] UNC Charlotte, SIS Dept, Charlotte, NC 28223 USA
[2] Guangxi Univ, Multimedia Key Lab, Nanning, Peoples R China
[3] Temple Univ, CIS Dept, Philadelphia, PA 19122 USA
关键词
D O I
10.1109/dsc47296.2019.8937713
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
dWith the popularity of cloud and edge computing, various types of service level agreement (SLA) are used to enforce the amount of resources that service providers commit to end users. However, the security SLAs (SSLA) are usually hard to verify since their execution results are related to the intensity and frequency of cyber attacks. In this paper, we investigate the proof of encryption problem. Restricted by available resources and hardware capabilities, some end users need to outsource the strong encryption operations of data to external service providers. Verification of the correct execution of encryption is a problem since it is directly related to data safety. We first define the expected properties of the Proof of Encryption (PoE) mechanisms. We propose two mechanisms based on whether or not the service requester is aware of the encryption key. They allow an end user to verify that corresponding encryption algorithm and key strength are honored. We describe the details of the verification procedures. Simulation and experiments show that our approaches can detect a dishonest service provider with high probability.
引用
收藏
页码:211 / 218
页数:8
相关论文
共 50 条
  • [41] Database Security Using Encryption
    Singh, Prabhsimran
    Kaur, Kuljit
    [J]. 2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 353 - 358
  • [42] Security of signed ElGamal encryption
    Schnorr, CP
    Jakobsson, M
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 73 - 89
  • [43] Homomorphic encryption with CCA security
    Prabhakaran, Manoj
    Rosulek, Mike
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 667 - 678
  • [44] ON MULTIPLE ENCRYPTION SECURITY - REPLY
    MERKLE, RC
    HELLMAN, ME
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (11) : 776 - 776
  • [45] Video encryption for security surveillance
    Huang, Jun
    Qian, Hongxuan
    [J]. 41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 207 - +
  • [46] Security Issues of Biometric Encryption
    Stoianov, A.
    Kevenaar, T.
    van der Veen, M.
    [J]. IEEE TIC-STH 09: 2009 IEEE TORONTO INTERNATIONAL CONFERENCE: SCIENCE AND TECHNOLOGY FOR HUMANITY, 2009, : 34 - 39
  • [47] Security processor for bulk encryption
    Ahmed, Z
    Rahmatullah, MM
    Jamal, H
    [J]. 16TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS, PROCEEDINGS, 2004, : 446 - 449
  • [48] On the security of the WinRAR encryption method
    Yeo, GSW
    Phan, RCW
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 402 - 416
  • [49] Adaptive security of symbolic encryption
    Micciancio, D
    Panjwani, S
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 169 - 187
  • [50] Computational Security of Quantum Encryption
    Alagic, Gorjan
    Broadbent, Anne
    Fefferman, Bill
    Gagliardoni, Tommaso
    Schaffner, Christian
    Jules, Michael St.
    [J]. INFORMATION THEORETIC SECURITY, ICITS 2016, 2016, 10015 : 47 - 71