KaaSP: Keying as a service provider for small and medium enterprises using untrusted cloud services

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Cloud computing provides a framework for allowing remote and nearly instantaneous access to data and resources from any location in the world with an Internet connection. However, it faces privacy concerns since cloud service providers can also access user data on their storage. Although several encryption services and applications were introduced for personal users, it is still questionable whether such services can effectively be deployed for enterprises due to their lack of scalability. We propose a new access control system that incorporates encryption, based on access via a third-party key management service. The proposed system introduces a new entity named a Keying as a Service Provider (KaaSP) to more securely provide a data encryption service. In our approach, data encryption keys are generated through a negotiation with the KaaSP which would not have access to all key parts. Therefore, even if petitioned by a powerful adversary such as a law enforcement organization or breached by an attack, the data could not be leaked. Moreover, user data on the cloud storage can be protected from access attempts made by a lost device controlled by an unauthorized user since a lost device's credential for authentication can instantly be revoked. Additionally, the controlling organization can seamlessly edit access credentials via this cryptographic framework.

Original languageEnglish
Title of host publicationACM IMCOM 2015 - Proceedings
PublisherAssociation for Computing Machinery, Inc
ISBN (Electronic)9781450333771
DOIs
StatePublished - 8 Jan 2015
Event9th International Conference on Ubiquitous Information Management and Communication, ACM IMCOM 2015 - Bali, Indonesia
Duration: 8 Jan 201510 Jan 2015

Publication series

NameACM IMCOM 2015 - Proceedings

Conference

Conference9th International Conference on Ubiquitous Information Management and Communication, ACM IMCOM 2015
Country/TerritoryIndonesia
CityBali
Period8/01/1510/01/15

Keywords

  • All-or-Nothing transform
  • AONT
  • Cloud computing
  • Domain management
  • Key management

Fingerprint

Dive into the research topics of 'KaaSP: Keying as a service provider for small and medium enterprises using untrusted cloud services'. Together they form a unique fingerprint.

Cite this