Stage-oe-small.jpg

Inproceedings3596: Unterschied zwischen den Versionen

Aus Aifbportal
Wechseln zu:Navigation, Suche
(Die Seite wurde neu angelegt: „{{Publikation Erster Autor |ErsterAutorNachname=Schiefer |ErsterAutorVorname=Gunther }} {{Publikation Author |Rank=2 |Author=Murat Citak }} {{Publikation Author |…“)
 
Zeile 32: Zeile 32:
 
|Abstract=Cloud computing offers many advantages as flexibility or resource efficiency and can significantly reduce costs. However, when sensitive data is outsourced to a cloud provider, classified records can leak. To protect data owners and application providers from a privacy breach data must be encrypted before it is uploaded. In this work, we present a distributed key management scheme that handles user-specific keys in a single-tenant scenario. The underlying database is encrypted and the secret key is split into parts and only reconstructed temporarily in memory. Our scheme distributes shares of the key to the different entities. We address bootstrapping, key recovery, the adversary model and the resulting security guarantees.
 
|Abstract=Cloud computing offers many advantages as flexibility or resource efficiency and can significantly reduce costs. However, when sensitive data is outsourced to a cloud provider, classified records can leak. To protect data owners and application providers from a privacy breach data must be encrypted before it is uploaded. In this work, we present a distributed key management scheme that handles user-specific keys in a single-tenant scenario. The underlying database is encrypted and the secret key is split into parts and only reconstructed temporarily in memory. Our scheme distributes shares of the key to the different entities. We address bootstrapping, key recovery, the adversary model and the resulting security guarantees.
 
|ISBN=978-1-5386-1710-6
 
|ISBN=978-1-5386-1710-6
|ISSN=2372-9198  
+
|ISSN=2372-9198
 +
|Download=Security in a Distributed Key Management Approach CloudSPD 2017.pdf,
 
|Link=http://ieeexplore.ieee.org/document/8104307/
 
|Link=http://ieeexplore.ieee.org/document/8104307/
 
|DOI Name=10.1109/CBMS.2017.151
 
|DOI Name=10.1109/CBMS.2017.151

Version vom 14. Dezember 2017, 17:21 Uhr


Security in a Distributed Key Management Approach


Security in a Distributed Key Management Approach



Published: 2017 Juni

Buchtitel: 30th International Symposium on Computer-Based Medical Systems (CBMS)
Seiten: 816-821
Verlag: IEEE
Organisation: IEEE

Referierte Veröffentlichung

BibTeX

Kurzfassung
Cloud computing offers many advantages as flexibility or resource efficiency and can significantly reduce costs. However, when sensitive data is outsourced to a cloud provider, classified records can leak. To protect data owners and application providers from a privacy breach data must be encrypted before it is uploaded. In this work, we present a distributed key management scheme that handles user-specific keys in a single-tenant scenario. The underlying database is encrypted and the secret key is split into parts and only reconstructed temporarily in memory. Our scheme distributes shares of the key to the different entities. We address bootstrapping, key recovery, the adversary model and the resulting security guarantees.

ISBN: 978-1-5386-1710-6
ISSN: 2372-9198
Download: Media:Security in a Distributed Key Management Approach CloudSPD 2017.pdf
Weitere Informationen unter: Link
DOI Link: 10.1109/CBMS.2017.151

Projekt

PaaSword



Forschungsgruppe

Betriebliche Informationssysteme


Forschungsgebiet