Abstract

Since the earliest days of cloud computing there has been a steady migration of data from local data stores to the cloud. As more and more cloud platforms become available, this inflow of data has only increased dramatically. By some estimates, "the cloud" will hold 50% of all data by 2020. Localized management of data is typically handled using tools, policies and access control methods that are appropriate to the local environment in question. Once data has been migrated to the cloud, these local tools and policies are rarely applicable and a new approach must be taken. Other works have focused on the problems associated with cloud security. This paper try to determine attribution and ownership for data in the cloud. Just because data is stored in account X that does not necessarily mean that X owns all the data in that account. An approach based on the use of a Public Key Infrastructure (PKI) is addressed to provide cryptographically strong data attribution and attestation for data in the cloud.

Highlights

  • Public Key Infrastructure (PKI) have been deployed for a variety of difference forms of distributed data management

  • This paper focuses on the software design and implementation choices associated with providing high performance processing that have arisen as part of the proposed implementation of the cloud PKI (CPKI)

  • We anticipate that an update will be performed roughly once a day; since the number of objects updated in this time period is typically only a fraction of the total number of objects, we focused on the initial synchronization and load as the performance bottleneck

Read more

Summary

Introduction

PKIs have been deployed for a variety of difference forms of distributed data management. An individual user can declare that any type or collection of data is a “resource” to be managed This allows for very fined grained control of data attribution and ownership with the CPKI. Given the large amount of data that is already in the cloud, there are very different implementation challenge from a typical PKI, in that in the CPKI every data user needs to validate every certificate and CRL at time of use. This level of granularity, when imposed over a vast array of data objects makes validation performance in the CPKI a very high priority.

Background
Conclusion
Methods
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call