DocumentCode :
172842
Title :
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
Author :
Thilakanathan, D. ; Calvo, R.A. ; Shiping Chen ; Nepal, S. ; Dongxi Liu ; Zic, J.
Author_Institution :
Fac. of Eng. & IT, Univ. of Sydney, Sydney, NSW, Australia
fYear :
2014
fDate :
June 27 2014-July 2 2014
Firstpage :
224
Lastpage :
231
Abstract :
The trend towards Cloud computing infrastructure has increased the need for new methods that allow data owners to share their data with others securely taking into account the needs of multiple stakeholders. The data owner should be able to share confidential data while delegating much of the burden of access control management to the Cloud and trusted enterprises. The lack of such methods to enhance privacy and security may hinder the growth of cloud computing. In particular, there is a growing need to better manage security keys of data shared in the Cloud. BYOD provides a first step to enabling secure and efficient key management, however, the data owner cannot guarantee that the data consumers device itself is secure. Furthermore, in current methods the data owner cannot revoke a particular data consumer or group efficiently. In this paper, we address these issues by incorporating a hardware-based Trusted Platform Module (TPM) mechanism called the Trusted Extension Device (TED) together with our security model and protocol to allow stronger privacy of data compared to software-based security protocols. We demonstrate the concept of using TED for stronger protection and management of cryptographic keys and how our secure data sharing protocol will allow a data owner (e.g, author) to securely store data via untrusted Cloud services. Our work prevents keys to be stolen by outsiders and/or dishonest authorised consumers, thus making it particularly attractive to be implemented in a real-world scenario.
Keywords :
authorisation; cloud computing; cryptographic protocols; data privacy; trusted computing; BYOD; TED; TPM mechanism; access control management; authorised consumer; cloud computing infrastructure; cloud enterprise; confidential data; cryptographic keys; data consumers; data owner; data privacy; data security; hardware-based TPM devices; hardware-based trusted platform module mechanism; secure data sharing protocol; secure multiparty data sharing; security key; security model; software-based security protocol; store data; trusted enterprise; trusted extension device; untrusted cloud services; Access control; Data models; Encryption; Privacy; Protocols; Access control; BYOD; Cloud Computing; Data sharing; Key management; Privacy; Security; TPM;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cloud Computing (CLOUD), 2014 IEEE 7th International Conference on
Conference_Location :
Anchorage, AK
Print_ISBN :
978-1-4799-5062-1
Type :
conf
DOI :
10.1109/CLOUD.2014.39
Filename :
6973745
Link To Document :
بازگشت