Cloud Key Management using Trusted Execution Environment

被引:1
作者
Bouamama, Jaouhara [1 ]
Hedabou, Mustapha [1 ]
Erradi, Mohammed [2 ]
机构
[1] Univ Mohammed VI Polytech, Benguerir, Morocco
[2] Univ Mohammed 5, ENSIAS, Rabat, Morocco
来源
SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2021年
关键词
Cloud Computing; Key Management; Intel SGX;
D O I
10.5220/0010558905600567
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage represents a primordial component in most information technology infrastructures. Using cloud instead of on-premise storage raises several security issues, especially when secret keys are stored on the cloud. In such a setting, a robust cloud key management system is a must. Using traditional key management systems (KMS) in the cloud suffers from performance and scalability limitations. This paper, proposes an efficient and secure cloud KMS based on Trusted Execution Environment, precisely Intel SGX. The suggested system (KMSGX), while being deployed on the cloud, is fully controlled by the end-user. Therefore, KMSGX allows running on-premise software key management securely on the cloud provider side, protecting the exchanged and stored data. The security properties of the suggested design have been formalized using the Applied Pi Calculus and proved with ProVerif. The experimental results have demonstrated the system's high performance in terms of the upload and download durations and the limited overhead compared to the plain design.
引用
收藏
页码:560 / 567
页数:8
相关论文
共 26 条
[1]   The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication [J].
Abadi, Martin ;
Blanchet, Bruno ;
Fournet, Cedric .
JOURNAL OF THE ACM, 2018, 65 (01)
[2]  
Amazon, 2015, AM CLOUDHSM
[3]   Data Protection in OpenStack [J].
Benjamin, Bruce ;
Coffman, Joel ;
Esiely-Barrera, Hadi ;
Farr, Kaitlin ;
Fichter, Dane ;
Genin, Daniel ;
Glendenning, Laura ;
Hamilton, Peter ;
Harshavardhana, Shaku ;
Hom, Rosalind ;
Poulos, Brianna ;
Reller, Nathan .
2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, :560-567
[4]  
Bentajer A., 2020, ADV ENG RES, V34, P78
[5]  
Blanchet Bruno., 2005, PROVERIF AUTOMATIC C
[6]  
Cervesato I., 2001, 16th Annual Symposium on Logic in Computer ScienceLICS, V1, P1
[7]  
Chakrabarti S, 2017, ARXIV PREPRINT ARXIV
[8]  
Chokhani R. C. M. I. S, 2013, CRYPTOGRAPHIC KEY MA
[9]  
Cortier V, 2014, FOUND TRENDS PROGRAM, V1, P117
[10]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654