Key Management as a Service

Liran Lerman, Olivier Markowitch, Jorge Nakahara Jr

2012

Abstract

In this paper we consider the security issues related to the key management in cloud computing. We focus on the difficulty of managing cryptographic keys necessary to maintain for example the confidentiality of information stored in the clouds. In this framework, we present a threshold cryptosystem as well as three protocols, based on cooperation between cloud providers and a random number generator which is a trusted third party, that covers the issue of key management.

References

  1. Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., and Zaharia, M. (2009). Above the clouds: A berkeley view of cloud computing. Technical report, EECS Department, University of California, Berkeley.
  2. Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., and Morrow, M. (2009). Blueprint for the intercloud - protocols and formats for cloud computing interoperability. In ICIW, pages 328-336. IEEE Computer Society.
  3. Buyya, R., Ranjan, R., and Calheiros, R. N. (2010). Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services. In Hsu, C.-H., Yang, L. T., Park, J. H., and Yeo, S.-S., editors, ICA3PP, volume 6081 of LNCS, pages 13-31. Springer.
  4. Catteddu, D. and Hogben, G. (2009). Cloud computing: benefits, risks and recommendations for information security. Technical report, ENISA.
  5. Woolley, R., Murray, M., Dounin, M., and Ermilov, R. (2008). arc4random predictable sequence vulnerability. http://security.freebsd.org/advisories/FreeBSDSA-08:11.arc4random.asc.
Download


Paper Citation


in Harvard Style

Lerman L., Markowitch O. and Nakahara Jr J. (2012). Key Management as a Service . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 276-281. DOI: 10.5220/0004071102760281


in Bibtex Style

@conference{secrypt12,
author={Liran Lerman and Olivier Markowitch and Jorge Nakahara Jr},
title={Key Management as a Service},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={276-281},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004071102760281},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Key Management as a Service
SN - 978-989-8565-24-2
AU - Lerman L.
AU - Markowitch O.
AU - Nakahara Jr J.
PY - 2012
SP - 276
EP - 281
DO - 10.5220/0004071102760281