Home |  ENGLISH |  Kontakt |  Impressum |  Datenschutz |  Anmelden |  KIT

Inproceedings3512: Unterschied zwischen den Versionen

Aus Aifbportal

Wechseln zu: Navigation, Suche
(Die Seite wurde neu angelegt: „{{Publikation Erster Autor |ErsterAutorNachname=Dowsley |ErsterAutorVorname=Rafael }} {{Publikation Author |Rank=2 |Author=Matthias Gabel }} {{Publikation Author …“)
 
 
Zeile 34: Zeile 34:
 
sensitive data to an probably untrusted cloud provider (third party) requires cryptographic methods like encryption. This
 
sensitive data to an probably untrusted cloud provider (third party) requires cryptographic methods like encryption. This
 
paper presents a novel approach to a distributed cloud key management scheme. In a setting with a public cloud application, data is encrypted by a separate trusted adapter before storing somewhere else. The encryption key is not persistently stored at the adapter. Several entities share parts of the key that is computed and temporarily stored at the adapter if needed. This work describes how the key management is working during bootstrapping and runtime as well as how key recovery can be performed.
 
paper presents a novel approach to a distributed cloud key management scheme. In a setting with a public cloud application, data is encrypted by a separate trusted adapter before storing somewhere else. The encryption key is not persistently stored at the adapter. Several entities share parts of the key that is computed and temporarily stored at the adapter if needed. This work describes how the key management is working during bootstrapping and runtime as well as how key recovery can be performed.
|Download=KeyMgmtFinal.pdf,  
+
|Download=KeyMgmtFinal.pdf,
 
|Projekt=PaaSword
 
|Projekt=PaaSword
 
|Forschungsgruppe=Betriebliche Informationssysteme
 
|Forschungsgruppe=Betriebliche Informationssysteme
 +
}}
 +
{{Forschungsgebiet Auswahl
 +
|Forschungsgebiet=Cloud Computing
 +
}}
 +
{{Forschungsgebiet Auswahl
 +
|Forschungsgebiet=Sicherheit
 
}}
 
}}

Aktuelle Version vom 21. Dezember 2016, 12:23 Uhr


A Distributed Key Management Approach




Published: 2016 Dezember
Herausgeber: IEEE
Buchtitel: Proc. of the 2nd International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'16), co-located with the 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016)
Verlag: IEEE
Erscheinungsort: Luxembourg
Organisation: IEEE

Referierte Veröffentlichung

BibTeX

Kurzfassung
Cloud computing provides reliable and highlyscalable access to resources over the internet. But outsourcing sensitive data to an probably untrusted cloud provider (third party) requires cryptographic methods like encryption. This paper presents a novel approach to a distributed cloud key management scheme. In a setting with a public cloud application, data is encrypted by a separate trusted adapter before storing somewhere else. The encryption key is not persistently stored at the adapter. Several entities share parts of the key that is computed and temporarily stored at the adapter if needed. This work describes how the key management is working during bootstrapping and runtime as well as how key recovery can be performed.

Download: Media:KeyMgmtFinal.pdf

Projekt

PaaSword



Forschungsgruppe

Betriebliche Informationssysteme


Forschungsgebiet

Cloud Computing, Sicherheit