Secure Management of Key Distribution in Cloud Scenarios

被引:0
|
作者
Cui, Zongmin [1 ,2 ]
Zhu, Hong [1 ]
Yu, Jing [2 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Peoples R China
[2] Jiujiang Univ, Jiujiang, Peoples R China
关键词
key distribution; tag derivation; key derivation; cloud computing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing key distribution scheme based on key derivation has security default in cloud scenarios. The scheme distributes decryption keys to users through tags stored on cloud server. If the tag is destroyed by cloud server intentionally or unintentionally, the key distribution is destroyed too. Besides the above case, if all related tags are stored on client operated by user, the storage burden is high. To eliminate the insecurity of key distribution, we propose a novel solution based on tag derivation. In our scheme, each user needs to manage a single key and tag. Through the two information, the user can compute all authorized keys without using any information stored on cloud server. That is, our key distribution scheme is unrelated to cloud server to enhance the security of key distribution. The experiment results show that the performance of our method is better than existing methods in key distribution and query.
引用
收藏
页码:18 / 21
页数:4
相关论文
共 50 条
  • [41] Public key distribution with secure DNS
    Galvin, JM
    PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, 1996, : 161 - 170
  • [42] Fiber lasers for secure key distribution
    Scheuer, Jacob
    2008 CONFERENCE ON OPTICAL FIBER COMMUNICATION/NATIONAL FIBER OPTIC ENGINEERS CONFERENCE, VOLS 1-8, 2008, : 1743 - 1744
  • [43] Secure Workload Management For Cloud Server
    Andola, Nitish
    Chandankhede, Himanshu
    Prakash, Sourabh
    Venkatesan, S.
    Verma, Shekhar
    2017 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [44] TZ-KMS: A Secure Key Management Service for Joint Cloud Computing with ARM TrustZone
    Luo, Shiyu
    Hua, Zhichao
    Xia, Yubin
    12TH IEEE SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2018) / 9TH INTERNATIONAL WORKSHOP ON JOINT CLOUD COMPUTING (JCC 2018), 2018, : 180 - 185
  • [45] A Secure Management Scheme Designed in Cloud
    Wang, Peng-yu
    Hong, Ming-quan
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 158 - 162
  • [46] Secure Data Deduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage
    Vignesh, R.
    Preethi, J.
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (04): : 811 - 825
  • [47] An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage
    Ahmad, Shahnawaz
    Mehfuz, Shabana
    Beg, Javed
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23):
  • [48] On the Suitability of Using SGX for Secure Key Storage in the Cloud
    Brorsson, Joakim
    Bideh, Pegah Nikbakht
    Nilsson, Alexander
    Hell, Martin
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2020, 2020, 12395 : 32 - 47
  • [49] Key management for secure overlay multicast
    Roh, JH
    Lee, KH
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 336 - 345
  • [50] Management of dynamic key of secure multicast
    Cui, Guohua
    Chen, Li
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2004, 32 (12): : 40 - 42