2012 IEEE 31st Symposium on Reliable Distributed Systems 2012
DOI: 10.1109/srds.2012.80
|View full text |Cite
|
Sign up to set email alerts
|

Versatile Key Management for Secure Cloud Storage

Abstract: Not only does storing data in the cloud utilize specialized infrastructures facilitating immense scalability and high availability, but it also offers a convenient way to share any information with user-defined third-parties. However, storing data on the infrastructure of commercial third party providers, demands trust and confidence. Simple approaches, like merely encrypting the data by providing encryption keys, which at most consist of a shared secret supporting rudimentary data sharing, do not support evol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 12 publications
(16 reference statements)
0
6
0
Order By: Relevance
“…Graf et al [12] presented an IaaS storage protection scheme addressing access control. The authors analyse access rights management of shared versioned encrypted data on cloud infrastructure for a restricted group and propose a scalable and flexible key management scheme.…”
Section: Secure Storagementioning
confidence: 99%
See 1 more Smart Citation
“…Graf et al [12] presented an IaaS storage protection scheme addressing access control. The authors analyse access rights management of shared versioned encrypted data on cloud infrastructure for a restricted group and propose a scalable and flexible key management scheme.…”
Section: Secure Storagementioning
confidence: 99%
“…Access rights are represented as a graph, making a distinction between data encryption keys and encrypted updates on the keys and enabling flexible join/leave client operations, similar to properties presented by the protocols in this paper. Despite its advantages, the requirement for client-side encryption limits the applicability of the scheme in [12] and introduces important functional limitations on indexing and search. In our model, all cryptographic operations are performed on trusted IaaS compute hosts, which are able to allocate more computational resources than client devices.…”
Section: Secure Storagementioning
confidence: 99%
“…Sebastian Graf et al [9] introduced stream-based Key Graphapproaches in the cloud environment. Their proposed architecture does not need re-encryption of any data.…”
Section: Review Of Literaturementioning
confidence: 99%
“…In [8], authors analysed access rights management of shared versioned encrypted data on cloud infrastructure for a restricted group. in their model they proposed an adoption for enabling scalable and flexible key management within cloud.…”
Section: Related Workmentioning
confidence: 99%