Key Management Systems at the Cloud Scale

被引:1
|
作者
Campagna, Matthew [1 ]
Gueron, Shay [1 ,2 ]
机构
[1] Amazon Web Serv Inc, Seattle, WA 98101 USA
[2] Univ Haifa, Dept Math, IL-3498838 Haifa, Israel
关键词
AES-GCM; cloud computing; key management; SECURITY;
D O I
10.3390/cryptography3030023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a cloud-scale encryption system. It discusses the constraints that shaped the design of Amazon Web Services' Key Management Service, and in particular, the challenges that arise from using a standard mode of operation such as AES-GCM while safely supporting huge amounts of encrypted data that is (simultaneously) generated and consumed by a huge number of users employing different keys. We describe a new derived-key mode that is designed for this multi-user-multi-key scenario typical at the cloud scale. Analyzing the resulting security bounds of this model illustrates its applicability for our setting. This mode is already deployed as the default mode of operation for the AWS key management service.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [21] Key management for access control in trusted cloud storages
    Song, W. (songwei@whu.edu.cn), 1613, Science Press (50):
  • [22] Research on Lightweight Key Management Solution in Hybrid Cloud
    Jiang, Bing
    Lu, Wenhu
    Cao, Lei
    Zhao, Longfei
    Peng, Hong
    Wei, Dongbing
    2024 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, ICSESS 2024, 2024, : 79 - 82
  • [23] Cloud Key Management using Trusted Execution Environment
    Bouamama, Jaouhara
    Hedabou, Mustapha
    Erradi, Mohammed
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 560 - 567
  • [24] A hierarchical data access and key management in cloud computing
    Sun, Tsuei-Hung
    Hwang, Min-Shiang
    ICIC Express Letters, 2012, 6 (02): : 569 - 574
  • [25] Secure Key Management Based Mobile Authentication in Cloud
    Priya, S. Shanmuga
    Yuvaraj, D.
    Murthy, T. Satyanarayana
    Chooralil, Varghese S.
    Krishnan, S. Navaneetha
    Banumathy, P.
    SundaraVadivel, P.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 887 - 896
  • [26] Key Management for Cloud Data Storage: Methods and Comparisons
    Buchade, Amar R.
    Ingle, Rajesh
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 263 - 270
  • [27] Efficient key management of data owner for cloud scenarios
    Cui, Zongmin
    Zhang, Lifen
    Gao, Guangyong
    Zhou, Caixue
    Deng, Anyuan
    Journal of Computational Information Systems, 2015, 11 (21): : 7693 - 7700
  • [28] Key management and key distribution for secure group communication in mobile and cloud network
    Vijayakumar, P.
    Chang, Victor
    Deborah, L. Jegatha
    Kshatriya, Bharat S. Rawal
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 123 - 125
  • [29] Testing large-scale cloud management
    Citron, D.
    Zlotnick, A.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2011, 55 (06)
  • [30] Systems and Virtualization Management: Standards and the Cloud
    Boursas, Latifa
    Carlson, Mark
    Jin, Hai
    Sibilla, Michelle
    Wold, Kes
    Communications in Computer and Information Science, 2010, 71