2013
DOI: 10.1007/978-3-642-38980-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Client-Controlled Cryptography-as-a-Service in the Cloud

Abstract: Abstract. Today, a serious concern about cloud computing is the protection of clients' data and computations against various attacks from outsiders as well as against the cloud provider. Moreover, cloud clients are rather limited in implementing, deploying and controlling their own security solutions in the cloud. The provider theoretically has access to stored keys in dormant images and deploying keys during run-time is infeasible because authenticating running VM instances is not possible. In this paper, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…These services can be accessible over a cloud management interface layer, which provides access over Representational State Transfer (REST)/Simple Object Access Protocol (SOAP) Application Programming Interfaces (APIs) or a management console website (Andrey Petukhov 2008;Doroodchi et al 2009;Gruschka and Iacono 2009;Antunes and Vieira 2011;Mainka et al 2012;Falkenberg et al 2013;Blome et al 2013;Zhou and Evans 2014;Prabadevi and Jeyanthi 2014;Kupser et al 2015;Subashini and Kavitha 2011;Masood and Java 2015;Fett et al 2015). Therefore, in addition to the existing security issues for traditional setting such as access control, secure communication, data confidentiality, integrity, availability, and privacy cloud systems bring new cloud specific security challenges (Ardagna et al 2015).…”
Section: Roadmapmentioning
confidence: 97%
“…These services can be accessible over a cloud management interface layer, which provides access over Representational State Transfer (REST)/Simple Object Access Protocol (SOAP) Application Programming Interfaces (APIs) or a management console website (Andrey Petukhov 2008;Doroodchi et al 2009;Gruschka and Iacono 2009;Antunes and Vieira 2011;Mainka et al 2012;Falkenberg et al 2013;Blome et al 2013;Zhou and Evans 2014;Prabadevi and Jeyanthi 2014;Kupser et al 2015;Subashini and Kavitha 2011;Masood and Java 2015;Fett et al 2015). Therefore, in addition to the existing security issues for traditional setting such as access control, secure communication, data confidentiality, integrity, availability, and privacy cloud systems bring new cloud specific security challenges (Ardagna et al 2015).…”
Section: Roadmapmentioning
confidence: 97%
“…Bugiel et al [2011], Fernandes et al [2013], Grobauer et al [2011], Gruschka and Jensen [2010], Jensen et al [2009], Paquette et al [2010], Saripalli and Walters [2010], and Somorovsky et al [2011] Integrity Booth et al [2013], Bugiel et al [2011], Fernandes et al [2013], Grobauer et al [2011], Gruschka and Jensen [2010], Bleikertz et al [2013], Booth et al [2013], Dahbur et al [2011], Fernandes et al [2013], Gruschka and Jensen [2010], Paquette et al [2010], and Rocha and Correia [2011] …”
Section: Confidentialitymentioning
confidence: 98%
“…Rocha and Correia [2011] present an overview of threats to cloud confidentiality brought by malicious insiders (which can include the cloud provider), discuss possible protection mechanisms, and describe their limitations. Bleikertz et al [2013] focus on the problem of protecting a customer from attacks brought by cloud providers, also considering the scenario including malicious outsiders (tenant-on-tenant attack surface). In particular, they consider the problem of securing cryptographic operations because, in principle, providers can access stored keys and consumers are not allowed to deploy their keys at runtime only.…”
Section: Provider-on-tenant and Tenant-on-providermentioning
confidence: 99%
“…TPMs were proposed to be used in cloud environments. Bleikertz et al [22] describe Cryptography-as-a-Service where TPM functionality is provided by the cloud. Memoir [8] presents a rollback protection framework for TPMs.…”
Section: Tpmmentioning
confidence: 99%