Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth

Florian Reimair, Johannes Feichtner, Dominik Ziegler, Sandra Kreuzhuber, Thomas Zefferer

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Current application and device landscapes became a harsh environment for data security. Multi-device users
enjoy the convenience and efficiency of modern distributed applications in a highly heterogeneous device
landscape. However, today’s data protection mechanisms fell behind in taking care of some current use cases
and application scenarios. We perform a case study and an in-depth security analysis and risk assessment
on a simplified set of three different cryptographic service provider types; software, hardware, and remote.
Our case study shows that different provider types can change application characteristics considerably. Our
security analysis and risk assessment shows how different provider types can influence the security properties
of a set of use cases. We found that no one provider can excel for every cryptographic task. Based on these
findings we formulate a list of features which we believe are crucial to get the data protection mechanisms
up to speed again so that everyone can again benefit from data security even in a world of highly distributed
applications and data.
Original languageEnglish
Title of host publicationProceedings of the 14th International Joint Conference on e-Business and Telecommunications
Place of PublicationPortugal
PublisherSciTePress
Pages367-374
Number of pages8
Volume4
ISBN (Print)978-989-758-259-2
DOIs
Publication statusPublished - Jul 2017

Keywords

  • Applied Cryptography
  • Cryptographic Service Providers
  • Cloud

ASJC Scopus subject areas

  • Computer Science(all)

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Experimental

Fingerprint Dive into the research topics of 'Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth'. Together they form a unique fingerprint.

Cite this