Publikation:

Versatile Group Security for Tree-Based Storage

Lade...
Vorschaubild

Dateien

thesis_lang.pdf
thesis_lang.pdfGröße: 1.35 MBDownloads: 163

Datum

2012

Autor:innen

Herausgeber:innen

Kontakt

ISSN der Zeitschrift

Electronic ISSN

ISBN

Bibliografische Daten

Verlag

Schriftenreihe

Auflagebezeichnung

DOI (zitierfähiger Link)
ArXiv-ID

Internationale Patentnummer

Angaben zur Forschungsförderung

Projekt

Open Access-Veröffentlichung
Open Access Green
Core Facility der Universität Konstanz

Gesperrt bis

Titel in einer weiteren Sprache

Publikationstyp
Masterarbeit/Diplomarbeit
Publikationsstatus
Published

Erschienen in

Zusammenfassung

The need to encrypt data in infrastructures containing thousands and thousands of entities having different access rights increases with the rapid growth of electronically stored sensitive data in all areas of business and life. A group-oriented communication system referred to as hierarchical access control is a main part of such an infrastructure. It forms a graph hierarchy in order to bind access rights to group nodes on different levels. Clients are able to join group nodes for getting permission in order to decrypt data which is encrypted with the corresponding group key. Each client maintains a key set contaning an own client key and all keys binded to groups the client is assigned to. Keys need to be renewed when a group affiliation changes, so that leaving clients are not able to decrypt group data anymore. In order not to re-encrypt data by using a renewed key, all keys are versioned and stored, so that the complete key graphs can be restored again. To sent renewed keys over an untrusted component (i.e. a server maintaining the key graph including the corresponding keys and a client holding a sub-key set), the new keys are encrypted with a key that is already known by the client.

This thesis describes an architecture for a revision-aware encryption framework on versioned data using a directed-acyclic key graph for hierarchical group management based on the VersaKey -approach. Previous approaches base on tree key graphs and provide only one top access right. Our approach enables multiple root instances connecting several key graph hierarchies. The key graph operates join and leave updates without re-encrypting storage data. The usage of a directed-acyclic key graph brings along more flexibility in key graph structure and group affiiations compared to binary tree hierarchies. On the other hand, this flexibility leads to an uncontrolled key graph expansion, key graph unbalance and non-linear scaling in key encryption. Proxy nodes are inserted
which act as auxiliary nodes to avoid those drawbacks. Inserted proxy nodes are only part of the key management hierarchy and do not encrypt storage data.

The major aspect of this work is to make the versioned key management scalable even on updates affecting many node entities. Therefore, we examine and describe the directed-acyclic key graph management in detail and introduce proxy nodes ensuring scalability regarding the nodes adjacent to the updated ancestor nodes. We show that the directed-acyclic graph-based key management that implements proxy nodes, leads to a constant number of encryption steps for newly created key materials outgoing from the updated node entity. This proceeding results in a constant overhead related to the number of affected and updated node entities.

Zusammenfassung in einer weiteren Sprache

Fachgebiet (DDC)
004 Informatik

Schlagwörter

Storage encryption, group security, tree-based storage, proxy nodes, DAG

Konferenz

Rezension
undefined / . - undefined, undefined

Forschungsvorhaben

Organisationseinheiten

Zeitschriftenheft

Zugehörige Datensätze in KOPS

Zitieren

ISO 690LANG, Patrick, 2012. Versatile Group Security for Tree-Based Storage [Master thesis]
BibTex
@mastersthesis{Lang2012Versa-17522,
  year={2012},
  title={Versatile Group Security for Tree-Based Storage},
  author={Lang, Patrick}
}
RDF
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/17522">
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:abstract xml:lang="eng">The need to encrypt data in infrastructures containing thousands and thousands of entities having different access rights increases with the rapid growth of electronically stored sensitive data in all areas of business and life. A group-oriented communication system referred to as hierarchical access control is a main part of such an infrastructure. It forms a graph hierarchy in order to bind access rights to group nodes on different levels. Clients are able to join group nodes for getting permission in order to decrypt data which is encrypted with the corresponding group key. Each client maintains a key set contaning an own client key and all keys binded to groups the client is assigned to. Keys need to be renewed when a group affiliation changes, so that leaving clients are not able to decrypt group data anymore. In order not to re-encrypt data by using a renewed key, all keys are versioned and stored, so that the complete key graphs can be restored again. To sent renewed keys over an untrusted component (i.e. a server maintaining the key graph including the corresponding keys and a client holding a sub-key set), the new keys are encrypted with a key that is already known by the client.&lt;br /&gt;&lt;br /&gt;This thesis describes an architecture for a revision-aware encryption framework on versioned data using a directed-acyclic key graph for hierarchical group management based on the VersaKey -approach. Previous approaches base on tree key graphs and provide only one top access right. Our approach enables multiple root instances connecting several key graph hierarchies. The key graph operates join and leave updates without re-encrypting storage data. The usage of a directed-acyclic key graph brings along more flexibility in key graph structure and group affiiations compared to binary tree hierarchies. On the other hand, this flexibility leads to an uncontrolled key graph expansion, key graph unbalance and non-linear scaling in key encryption. Proxy nodes are inserted&lt;br /&gt;which act as auxiliary nodes to avoid those drawbacks. Inserted proxy nodes are only part of the key management hierarchy and do not encrypt storage data.&lt;br /&gt;&lt;br /&gt;The major aspect of this work is to make the versioned key management scalable even on updates affecting many node entities. Therefore, we examine and describe the directed-acyclic key graph management in detail and introduce proxy nodes ensuring scalability regarding the nodes adjacent to the updated ancestor nodes. We show that the directed-acyclic graph-based key management that implements proxy nodes, leads to a constant number of encryption steps for newly created key materials outgoing from the updated node entity. This proceeding results in a constant overhead related to the number of affected and updated node entities.</dcterms:abstract>
    <dc:rights>terms-of-use</dc:rights>
    <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/>
    <dc:contributor>Lang, Patrick</dc:contributor>
    <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/17522/1/thesis_lang.pdf"/>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2012-01-10T09:40:00Z</dcterms:available>
    <dc:language>eng</dc:language>
    <dcterms:issued>2012</dcterms:issued>
    <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/17522"/>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:title>Versatile Group Security for Tree-Based Storage</dcterms:title>
    <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/17522/1/thesis_lang.pdf"/>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2012-01-10T09:40:00Z</dc:date>
    <dc:creator>Lang, Patrick</dc:creator>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
  </rdf:Description>
</rdf:RDF>

Interner Vermerk

xmlui.Submission.submit.DescribeStep.inputForms.label.kops_note_fromSubmitter

Kontakt
URL der Originalveröffentl.

Prüfdatum der URL

Prüfungsdatum der Dissertation

Finanzierungsart

Kommentar zur Publikation

Allianzlizenz
Corresponding Authors der Uni Konstanz vorhanden
Internationale Co-Autor:innen
Universitätsbibliographie
Begutachtet
Diese Publikation teilen