Secure Hardware-Based Public Cloud Storage

Bernd Zwattendorfer, Bojan Suzic, Peter Teufl, Andreas Derler

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

The storage of data on remote systems such as the public cloud opens new challenges in the field of data protection and security of the stored files. One
possible solution formeetingthese chal lenges is the encryption of the data at the local device, e.g. desktop, tablet, or smartphone, prior to the data transfer to the remote cloud-based storage. However, this approach bears additional challenges itself, such as secure encryption key management or secure and effective sharing of data in user groups. Including an additional encryption layerand security checks may additionally affect the system’s usability, as higher security requirements and a group sharing workflow increase general overhead through the complete organization of processes. To overcome such issues, we propose a solution which is based on highly secure and attack-resistant hardware-based encryption applied through the use of the Austrian citizen card public key infrastructure. As the citizen card infrastructure is already deployed and avai lable to a wide population, the service overhead and additional requirements of our proposed solutionare lower in comparison to other approaches, while at the same time synergistic and networking effects of the deployed infrastructure facilitate its usage and further potentials.
Original languageEnglish
Title of host publicationOpen Identity Summit 2013
PublisherSpringer
Pages43-54
Publication statusPublished - 2013
EventOpen Identity Summit 2013 - Kloster Banz, Germany
Duration: 10 Sept 201311 Sept 2013

Conference

ConferenceOpen Identity Summit 2013
Country/TerritoryGermany
CityKloster Banz
Period10/09/1311/09/13

Keywords

  • cloud
  • public cloud
  • smart card
  • eid
  • cloud eid

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application

Fingerprint

Dive into the research topics of 'Secure Hardware-Based Public Cloud Storage'. Together they form a unique fingerprint.

Cite this