Cryptography key management system plays a very central role in the cloud data security. Nonetheless, a great part of the current commercial solutions rely on cloud providers that hold both the encrypted data and the related private master key of their served customers in their secure key vaults, having a de-facto total control on their customer digital assets. Conversely, entrusting customer companies for key holding can be dangerous as witnessed by many cases of key loss or theft. In this work we present CoProtect, a novel architecture to protect the cryptography keys in cloud systems that leverage on the cooperation between the cloud provider and the customer company. With such trust model, we present the proposed data management strategy, the key generation and the crypto procedures, and a proof of concept.
Bracciale, L., Loreti, P., Raso, E., Naldi, M., Bianchi, G. (2020). CoProtect: collaborative management of cryptographic keys for data security in cloud systems. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (pp.361). SciTePress [10.5220/0008921603610368].
CoProtect: collaborative management of cryptographic keys for data security in cloud systems
Lorenzo Bracciale
;Pierpaolo Loreti;Maurizio Naldi;Giuseppe Bianchi
2020-01-01
Abstract
Cryptography key management system plays a very central role in the cloud data security. Nonetheless, a great part of the current commercial solutions rely on cloud providers that hold both the encrypted data and the related private master key of their served customers in their secure key vaults, having a de-facto total control on their customer digital assets. Conversely, entrusting customer companies for key holding can be dangerous as witnessed by many cases of key loss or theft. In this work we present CoProtect, a novel architecture to protect the cryptography keys in cloud systems that leverage on the cooperation between the cloud provider and the customer company. With such trust model, we present the proposed data management strategy, the key generation and the crypto procedures, and a proof of concept.File | Dimensione | Formato | |
---|---|---|---|
CoProtect.pdf
accesso aperto
Tipologia:
Documento in Pre-print
Licenza:
Creative commons
Dimensione
537.03 kB
Formato
Adobe PDF
|
537.03 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.