A Scattering Technique for Protecting Cryptographic Keys in the Cloud

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Cloud computing has become a widely used computing paradigm providing on-demand computing and storage capabilities based on pay-As-you-go model. Recently, many organizations, especially in the field of big data, have been adopting the cloud model to perform data analytics through leasing powerful Virtual Machines (VMs). VMs can be attractive targets to attackers as well as untrusted cloud providers who aim to get unauthorized access to the business critical-data. The obvious security solution is to perform data analytics on encrypted data through the use of cryptographic keys as that of the Advanced Encryption Standard (AES). However, it is very easy to obtain AES cryptographic keys from the VM's Random Access Memory (RAM). In this paper, we present a novel key-scattering (KS) approach to protect the cryptographic keys while encrypting/decrypting data. Our solution is highly portable and interoperable. Thus, it could be integrated within today's existing cloud architecture without the need for further modifications. The feasibility of the approach has been proven by implementing a functioning prototype. The evaluation results show that our approach is substantially more resilient to brute force attacks and key extraction tools than the standard AES algorithm, with acceptable execution time.

Original languageBritish English
Title of host publicationProceedings - 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems, FAS*W 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages301-306
Number of pages6
ISBN (Electronic)9781509065585
DOIs
StatePublished - 9 Oct 2017
Event2nd IEEE International Workshops on Foundations and Applications of Self* Systems, FAS*W 2017 - Tucson, United States
Duration: 18 Sep 201722 Sep 2017

Publication series

NameProceedings - 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems, FAS*W 2017

Conference

Conference2nd IEEE International Workshops on Foundations and Applications of Self* Systems, FAS*W 2017
Country/TerritoryUnited States
CityTucson
Period18/09/1722/09/17

Keywords

  • Cloud Computing
  • Cloud Security
  • Memory Protection
  • Secure Cryptographic Keys
  • Virtual Machines

Fingerprint

Dive into the research topics of 'A Scattering Technique for Protecting Cryptographic Keys in the Cloud'. Together they form a unique fingerprint.

Cite this