A distributed key management approach

Rafael Dowsley, Matthias Gabel, Gerald Hubsch, Gunther Schiefer, Antonia Schwichtenberg

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)


Cloud computing provides reliable and highlyscalable access to resources over the internet. But outsourcing sensitive data to an probably untrusted cloud provider (third party) requires cryptographic methods like encryption. This paper presents a novel approach to a distributed cloud key management scheme. In a setting with a public cloud application, data is encrypted by a separate trusted adapter before storing somewhere else. The encryption key is not persistently stored at the adapter. Several entities share parts of the key that is computed and temporarily stored at the adapter if needed. This work describes how the key management is working during bootstrapping and runtime as well as how key recovery can be performed.

Original languageEnglish
Title of host publicationProceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016
EditorsGrégoire Danoy, Sathish Gopalakrishnan
Place of PublicationPiscataway NJ USA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Number of pages6
ISBN (Electronic)9781509014453
ISBN (Print)9781509014460
Publication statusPublished - 2016
Externally publishedYes
EventInternational Workshop on Cloud Security and Data Privacy by Design 2016 - Luxembourg, Luxembourg
Duration: 12 Dec 201612 Dec 2016
Conference number: 2nd
https://ieeexplore.ieee.org/xpl/conhome/7823365/proceeding (Proceedings)
http://2016cloudcom.ux.uis.no/conf/workshops/cloudspd.html (Website)


ConferenceInternational Workshop on Cloud Security and Data Privacy by Design 2016
Abbreviated titleCloudSPD 2016
Internet address


  • Cloud Computing
  • Key Distribution
  • Key Management

Cite this