Abstract
Cloud computing provides reliable and highlyscalable access to resources over the internet. But outsourcing sensitive data to an probably untrusted cloud provider (third party) requires cryptographic methods like encryption. This paper presents a novel approach to a distributed cloud key management scheme. In a setting with a public cloud application, data is encrypted by a separate trusted adapter before storing somewhere else. The encryption key is not persistently stored at the adapter. Several entities share parts of the key that is computed and temporarily stored at the adapter if needed. This work describes how the key management is working during bootstrapping and runtime as well as how key recovery can be performed.
Original language | English |
---|---|
Title of host publication | Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016 |
Editors | Grégoire Danoy, Sathish Gopalakrishnan |
Place of Publication | Piscataway NJ USA |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Pages | 509-514 |
Number of pages | 6 |
ISBN (Electronic) | 9781509014453 |
ISBN (Print) | 9781509014460 |
DOIs | |
Publication status | Published - 2016 |
Externally published | Yes |
Event | International Workshop on Cloud Security and Data Privacy by Design 2016 - Luxembourg, Luxembourg Duration: 12 Dec 2016 → 12 Dec 2016 Conference number: 2nd https://ieeexplore.ieee.org/xpl/conhome/7823365/proceeding (Proceedings) http://2016cloudcom.ux.uis.no/conf/workshops/cloudspd.html (Website) |
Conference
Conference | International Workshop on Cloud Security and Data Privacy by Design 2016 |
---|---|
Abbreviated title | CloudSPD 2016 |
Country/Territory | Luxembourg |
City | Luxembourg |
Period | 12/12/16 → 12/12/16 |
Internet address |
Keywords
- Cloud Computing
- Key Distribution
- Key Management