Updatable Oblivious Key Management for Storage Systems
Title | Updatable Oblivious Key Management for Storage Systems |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Jarecki, Stanislaw, Krawczyk, Hugo, Resch, Jason |
Conference Name | Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security |
Date Published | November 2019 |
Publisher | Association for Computing Machinery |
Conference Location | London, United Kingdom |
ISBN Number | 978-1-4503-6747-9 |
Keywords | Human Behavior, human factors, Key Management, Metrics, oblivious prf, oprf, pubcrawl, resilience, Resiliency, Scalability, updatable encryption |
Abstract | We introduce Oblivious Key Management Systems (KMS) as a much more secure alternative to traditional wrapping-based KMS that form the backbone of key management in large-scale data storage deployments. The new system, that builds on Oblivious Pseudorandom Functions (OPRF), hides keys and object identifiers from the KMS, offers unconditional security for key transport, provides key verifiability, reduces storage, and more. Further, we show how to provide all these features in a distributed threshold implementation that enhances protection against server compromise. We extend this system with updatable encryption capability that supports key updates (known as key rotation) so that upon the periodic change of OPRF keys by the KMS server, a very efficient update procedure allows a client of the KMS service to non-interactively update all its encrypted data to be decryptable only by the new key. This enhances security with forward and post-compromise security, namely, security against future and past compromises, respectively, of the client's OPRF keys held by the KMS. Additionally, and in contrast to traditional KMS, our solution supports public key encryption and dispenses with any interaction with the KMS for data encryption (only decryption by the client requires such communication). Our solutions build on recent work on updatable encryption but with significant enhancements applicable to the remote KMS setting. In addition to the critical security improvements, our designs are highly efficient and ready for use in practice. We report on experimental implementation and performance. |
URL | https://dl.acm.org/doi/10.1145/3319535.3363196 |
DOI | 10.1145/3319535.3363196 |
Citation Key | jarecki_updatable_2019 |