首页|Encryption key management as a trusted security as a service for cloud computing
Encryption key management as a trusted security as a service for cloud computing
扫码查看
点击上方二维码区域,可以放大扫码查看
原文链接
NSTL
Cloud computing has become very popular and its users and services are in constant increase. Currently, many mobile IT users are accessing business data and services without going through corporate networks. Consequently, the need for putting appropriate and robust security controls between mobile users and cloud-based services is crucial. This is the main reason behind the proliferation of new security as a service (SecaaS) offers. The common security mechanism of most services and communications is based on the encryption/signing keys, which themselves depend highly on the cryptographic key management system (CKMS) itself. This is called trustworthy protocol and its implementation is the most challenging of the whole security and protection policies and mechanisms. To deal with this challenge, we propose an approach that provides a CKMS as a trusted SecaaS based on the trusted platform module (TPM), which is the foundation for the trust, keys generation, and SecaaS authentication. We define an efficient security protocol that creates, certifies, and encrypts any encryption/signing key inside TPM. Key leaves TPM in encapsulated format, and it delivered to its owner in a secure way without decryption.
cloud computingsecurity as a serviceSecaaScryptographic key management systemCKMStrusted platform moduleTPM
Saad Fehis、Omar Nouali、Mohand-Tahar Kechadi
展开 >
Ecole Nationale Supérieure d'Informatique
Research Center on Scientific and Technical Information
School of Computer Science and Informatics, University College Dublin