Security in a Distributed Key Management Approach
Title | Security in a Distributed Key Management Approach |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Schiefer, G., Gabel, M., Mechler, J., Schoknecht, A., Citak, M. |
Conference Name | 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS) |
ISBN Number | 978-1-5386-1710-6 |
Keywords | application providers, classified records, cloud computing, cloud provider, Cloud Security, cryptography, data owners, data privacy, Databases, distributed key management approach, Encryption, Human Behavior, Key Distribution, Key Management, Metrics, outsourcing, privacy breach data, pubcrawl, resilience, Resiliency, Runtime, Scalability, sensitive data, Servers, single-tenant scenario, user-specific keys |
Abstract | Cloud computing offers many advantages as flexibility or resource efficiency and can significantly reduce costs. However, when sensitive data is outsourced to a cloud provider, classified records can leak. To protect data owners and application providers from a privacy breach data must be encrypted before it is uploaded. In this work, we present a distributed key management scheme that handles user-specific keys in a single-tenant scenario. The underlying database is encrypted and the secret key is split into parts and only reconstructed temporarily in memory. Our scheme distributes shares of the key to the different entities. We address bootstrapping, key recovery, the adversary model and the resulting security guarantees. |
URL | http://ieeexplore.ieee.org/document/8104307/ |
DOI | 10.1109/CBMS.2017.151 |
Citation Key | schiefer_security_2017 |
- key management
- user-specific keys
- single-tenant scenario
- Servers
- sensitive data
- Scalability
- Runtime
- Resiliency
- resilience
- pubcrawl
- privacy breach data
- outsourcing
- Metrics
- application providers
- Key Distribution
- Human behavior
- encryption
- distributed key management approach
- Databases
- data privacy
- data owners
- Cryptography
- Cloud Security
- cloud provider
- Cloud Computing
- classified records