Research of Key Management Technology On Cloud Storage: Ningning Song, Zhiwei Wei, Xianwei Xhou and Qian Liu
Research of Key Management Technology On Cloud Storage: Ningning Song, Zhiwei Wei, Xianwei Xhou and Qian Liu
Abstract—Since the cloud storage technology has management scheme. Centralized key management
distribution, isolation and sharing characteristics, key scheme is defined by the key distribution center (KDC) or
management has become more and more difficulty. As a a group of a hierarchy of nodes responsible for key
consequence, the research of key management technology generation and assigned to the communication parties.
has become a hot topic in recent years. In order to solve the Distributed key distribution scheme refers to the various
untrustworthiness of cloud storage server provider, the communication network communications side has the
complexity, security of key and some other issues under same status as key distribution between them depends on
cloud storage environment, this paper proposed negotiation between them, without any restrictions on any
a (n + 1, s + 1) key management technology on the basis other party (step further, you can put the key dispersed
of Shamir (n, s) and then this technology was used in cloud distribution center all communication parties, that is, each
communication party is also a key distribution center).
storage system. The main idea of the technology is that the Hybrid key management scheme mainly mixing the above
whole key spited into n+1 parts and distributed to the
two programs: the upper (host) using a distributed key
different cloud storage service providers and data owner to
distribution scheme, while the lower terminal or
manage the sub-keys. Through the performance analysis, in
communication subnet it belongs to a centralized key
this technology, the data owner is the core of the
distribution scheme.
management process. The technology is more secure than
the traditional technology and solves the untrustworthiness But the three programs primarily based on symmetric
of cloud storage server provider based on the premise of encryption key management scheme to achieve, difficult
reducing the burden of data owner. to adapt and asymmetric key encryption scheme. For the
current shortcomings of the key management scheme, the
Index Terms—Cloud storage, Key management, Key escrow, paper describes a distributed key management method,
Threshold. which is mainly the user to effectively break down the key
in advance, and then factored different keys entrusted to
other fragment unrelated providers, and then design a
I. INTRODUCTION threshold, when the ISP provides key number is greater
With the rapid development of Internet information, than the threshold [4], the data can be decrypted.
information data net-work has being arises, but how to
store the information data has become a topic of II. THE DIVISION OF KEY MANAGEMENT TECHNOLOGY
increasing concern. In this condition, the modern cloud Threshold key management scheme is based on Shamir
storage technology [1] has ushered in the good key distributed hosting mechanism [5-9], which is mainly
development opportunities, but also huge challenges will the user to effectively break down the key in advance, and
be subject to network information security. The rapid then factored different keys entrusted to other fragment
development of cloud storage technology, people can unrelated providers, cloud storage ISP technology is
basically meet the daily demand for data storage. But isolated from each other, so the keys store to another ISP
when people use data of the storage network, found that is safe, so as to achieve the key confidentiality. Finally, it
the user privacy protection is very important on cloud managed to set a threshold, so by different provider key
storage. In recent years, customer privacy breaches have cross-certification to get the correct key.
occurred, but also to the user caused huge losses.
According to research, data privacy leak is mostly due to A. The Definition of Key Division Management
loss privacy key, how to ensure the security of key user Technology
privacy is an important aspect of the research of cloud
Definition 1: Assume that a full key sK is divided
storage security.
into n parts; each part is a small sub-key, and which are
In key management technology, there are two problems allocated to N different key manager [10]. Therefore,
to solve: [1-3] In order to reduce user burden, improve through a collection of some sub keys to deduce the
efficiency, we must introduce an automatic key complete key sK principle is:
management mechanisms; In order to improve safety, and
it should be possible to reduce the system resides key (1) If the collection is greater than the number of sub-
amount key s, then we can derive the complete key
In order to solve these two problems, there are three (2) If the number is less than the collection of sub-key
types of key scenarios: centralized, distributed, hybrid key s, then the complete key sK cannot be launched
58 http://www.i-joe.org
PAPER
RESEARCH OF KEY MANAGEMENT TECHNOLOGY ON CLOUD STORAGE
elementary matrix Ei1 Ei 2 ...Eis and the inverse providers more than s key can also be deduced correctly
!1 !1 !1 complete key.
matrix E E ...E calculation:
is is !1 i1 Thus, the threshold-based management program is a
scientific technology.
" a1'' #
$ '' % C. Performance Evaluation
$ a2 %
$ ... % The performance analysis is based on the school cloud
$ '' % storage platform verification, it is mainly from the
!1 $ s %
a traditional (n, s) Encryption efficiency and security
Eis Eis !1 ...Ei1 $ ' % = Eis!1 Eis!1!1 ...Ei!11 Ei1 Ei 2 ...Eis
!1 !1
(7)
a aspects were analyzed.
$ % 1
60 http://www.i-joe.org
PAPER
RESEARCH OF KEY MANAGEMENT TECHNOLOGY ON CLOUD STORAGE
traditional (n, s) full probability decreases, but the owners and cloud storage service provider. This greatly
probability of this scenario to be cracked is 0, which is reduces the file size of the key data owners, but also a
verified by theoretical analysis above: the good solution to untrusted cloud storage service provider
program (n + 1, s + 1) , if the owner of the key missing data, hidden problems. Because the technology is based on the
threshold to restore the original key, even if part of the
then you must not break out the full key under any cloud storage service provider sub key lost key recovery
circumstances. can also be a complete success, thus enhancing the
(2)When the attacker access to the key, with the robustness of the key, and their correctness and security
increase in the number of both to verify the effectiveness of the technique.
The threshold s, the complete key is the probability of
successful recovery (Figure 3). REFERENCES
From Figure 2, we can see that, compared with the [1] W. Zeng, Y. Zhao, and W. Song, “Research on cloud storage
threshold gradually increased, the two solutions complete architecture and key technologies.” In Proceedings of the 2nd
key is basically the same as the probability of cracking, International Conference on Interaction Sciences: Information
Technology, Culture and Human (pp. 1044-1048). 2009 ACM.
and shows that even in the conditions of access to the key,
[2] E. Laurent, D. Gligor. “A key-management scheme for distributed
two solutions the same security. Further validation of the sensor networks.” Proceedings of the 9th ACM conference on
program inherits the traditional scheme has the security Computer and communications security. ACM, 2002, pp. 41-47.
features [3] T. Landstra, M. Zawodniok, and S. Jagannathan, “Energy-efficient
Through this performance analysis, when the number is hybrid key management protocol for wireless sensor networks.” In
less than a certain number of split keys, the performance Local Computer Networks, 2007. LCN 2007. 32nd IEEE
slightly worse with the traditional; But when the number Conference on (pp. 1009-1016). IEEE.
is greater than the number of split keys, the performance is [4] J. V. Martins, D. Tanré, L. Remer, and Y. Kaufman, “MODIS
cloud screening for remote sensing of aerosols over oceans using
almost identical with the traditional. Meanwhile, the spatial variability.” Geophysical Research Letters,2002, 29(12),
program has strong security, if no sub-key case; regardless 8009. http://dx.doi.org/10.1029/2001GL013252
of what method the attacker cannot break out of the [5] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining
complete key. Even if the cracks in the access to the data digital signatures and public-key cryptosystems.” Communications
owner sub key case, the program also has the security of a of the ACM, 1978, 21(2), 120-126. http://dx.doi.org/10.1145/
traditional performance. 359340.359342
Thus, we can see that with respect to this program has a [6] M. Burmester, Y. Desmedt, “A secure and efficient conference
key distribution system.” In Advances in Cryptology—
strong tradition of safety, because the cloud storage EUROCRYPT'94 (pp. 275-286). Springer Berlin Heidelberg.
service provider without the user's sub-keys, the key [7] M. Naor, A. Shamir, “Visual cryptography.” In Advances in
cannot derive the full, so this program effectively solves Cryptology—EUROCRYPT'94 (pp.1-12). Springer Berlin
the cloud storage service providers credible problem. Heidelberg.
Relative to the complete key, users’ only need to save a [8] J. Sherman, W. J. Morrison, “Adjustment of an inverse matrix
small a sub-key, so that can be a good drop of data owners corresponding to a change in one element of a given matrix.” The
manage keys burden. Annals of Mathematical Statistics, 1950,21(1), 124-127.
http://dx.doi.org/10.1214/aoms/1177729893
[9] R. N. Calheiros, R. Ranjan, and C. A. De Rose, Cloudsim: “A
novel framework for modeling and simulation of cloud computing
infrastructures and services.” arXiv preprint arXiv:0903.2525,
2009.
[10] E. Roe, M. V. Eeten, “Threshold-based resource management: a
framework for comprehensive ecosystem management.”
Environmental Management, 2001,27(2), 195-214.
http://dx.doi.org/10.1007/s002670010143
AUTHORS
Ningning Song is with University of Science &
Technology Beijing, Beijing 100083, China (e-mail:
[email protected]).
Zhiwei Wei is with University of Science &
Technology Beijing, Beijing 100083, China (e-mail:
Figure 3. Traditional (n, s) and the new technology (data owner key) [email protected]).
graph comparing crack Xianwei Zhou is with University of Science &
Technology Beijing, Beijing 100083, China (e-mail:
[email protected]).
IV. CONCLUSIONS
Qian Liu is with University of Science & Technology
Based on the current key management technology Beijing, Beijing 100083, China (e-mail:
research and analysis for key management unilaterally [email protected]).
research untrusted cloud storage service provider problem,
we propose a key management technology, which is based Submitted 03 October 2013. Published as re-submitted by the authors
on Shamir key mechanism based on a distributed hosting 05 November 2013.
threshold Key split on the use of management techniques
to achieve. The technique involves key managers to data