DocumentCode :
173029
Title :
Keeping Your API Keys in a Safe
Author :
Lu, Hongqian Karen
Author_Institution :
Gemalto, Inc., Austin, TX, USA
fYear :
2014
fDate :
June 27 2014-July 2 2014
Firstpage :
962
Lastpage :
965
Abstract :
Cloud API (Application Programming Interface) enables client applications to access services and manage resources hosted in the Cloud. To protect themselves and their customers, Cloud service providers (CSP) often require client authentication for each API call. The authentication usually depends on some kind of secret (or called API key), for example, secret access key, password, or access token. As such, the API key unlocks the door to the treasure inside the Cloud. Hence, protecting these keys is critical. It is a difficult task especially on the client side, such as users´ computers or mobile devices. How do CSPs authenticate client applications? What are security risks of managing API keys in common practices? How can we mitigate these risks? This paper focuses on finding answers to these questions. By reviewing popular client authentication methods that CSPs use and using Cloud APIs as software developers, we identified various security risks associated with API keys. To mitigate these risks, we use hardware secure elements for secure key provisioning, storage, and usage. The solution replaces the manual key handling with end-to-end security between CSP and its customers´ secure elements. This removes the root causes of the identified risks and enhances API security. It also enhances the usability by eliminating manual key operations and alleviating software developers´ worries of working with cryptography.
Keywords :
application program interfaces; client-server systems; cloud computing; cryptography; API security; CSP; application programming interface; client applications; client authentication; client side; cloud API key management; cloud service providers; customer secure elements; end-to-end security; hardware secure elements; resource management; secure key provisioning; security risks; software developers; Authentication; Companies; Computers; Cryptography; Smart cards; Software; client authentication; key management; secure elements; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cloud Computing (CLOUD), 2014 IEEE 7th International Conference on
Conference_Location :
Anchorage, AK
Print_ISBN :
978-1-4799-5062-1
Type :
conf
DOI :
10.1109/CLOUD.2014.143
Filename :
6973849
Link To Document :
بازگشت