首页|Encryption key management as a trusted security as a service for cloud computing

Encryption key management as a trusted security as a service for cloud computing

扫码查看
Cloud computing has become very popular and its users and services are in constant increase. Currently, many mobile IT users are accessing business data and services without going through corporate networks. Consequently, the need for putting appropriate and robust security controls between mobile users and cloud-based services is crucial. This is the main reason behind the proliferation of new security as a service (SecaaS) offers. The common security mechanism of most services and communications is based on the encryption/signing keys, which themselves depend highly on the cryptographic key management system (CKMS) itself. This is called trustworthy protocol and its implementation is the most challenging of the whole security and protection policies and mechanisms. To deal with this challenge, we propose an approach that provides a CKMS as a trusted SecaaS based on the trusted platform module (TPM), which is the foundation for the trust, keys generation, and SecaaS authentication. We define an efficient security protocol that creates, certifies, and encrypts any encryption/signing key inside TPM. Key leaves TPM in encapsulated format, and it delivered to its owner in a secure way without decryption.

cloud computingsecurity as a serviceSecaaScryptographic key management systemCKMStrusted platform moduleTPM

Saad Fehis、Omar Nouali、Mohand-Tahar Kechadi

展开 >

Ecole Nationale Supérieure d'Informatique

Research Center on Scientific and Technical Information

School of Computer Science and Informatics, University College Dublin

2021

International Journal of Security and Networks

International Journal of Security and Networks

EI
ISSN:1747-8405
年,卷(期):2021.16(3)