Versatile Group Security for Tree-Based Storage

dc.contributor.authorLang, Patrick
dc.date.accessioned2012-01-10T09:40:00Zdeu
dc.date.available2012-01-10T09:40:00Zdeu
dc.date.issued2012deu
dc.description.abstractThe need to encrypt data in infrastructures containing thousands and thousands of entities having different access rights increases with the rapid growth of electronically stored sensitive data in all areas of business and life. A group-oriented communication system referred to as hierarchical access control is a main part of such an infrastructure. It forms a graph hierarchy in order to bind access rights to group nodes on different levels. Clients are able to join group nodes for getting permission in order to decrypt data which is encrypted with the corresponding group key. Each client maintains a key set contaning an own client key and all keys binded to groups the client is assigned to. Keys need to be renewed when a group affiliation changes, so that leaving clients are not able to decrypt group data anymore. In order not to re-encrypt data by using a renewed key, all keys are versioned and stored, so that the complete key graphs can be restored again. To sent renewed keys over an untrusted component (i.e. a server maintaining the key graph including the corresponding keys and a client holding a sub-key set), the new keys are encrypted with a key that is already known by the client.

This thesis describes an architecture for a revision-aware encryption framework on versioned data using a directed-acyclic key graph for hierarchical group management based on the VersaKey -approach. Previous approaches base on tree key graphs and provide only one top access right. Our approach enables multiple root instances connecting several key graph hierarchies. The key graph operates join and leave updates without re-encrypting storage data. The usage of a directed-acyclic key graph brings along more flexibility in key graph structure and group affiiations compared to binary tree hierarchies. On the other hand, this flexibility leads to an uncontrolled key graph expansion, key graph unbalance and non-linear scaling in key encryption. Proxy nodes are inserted
which act as auxiliary nodes to avoid those drawbacks. Inserted proxy nodes are only part of the key management hierarchy and do not encrypt storage data.

The major aspect of this work is to make the versioned key management scalable even on updates affecting many node entities. Therefore, we examine and describe the directed-acyclic key graph management in detail and introduce proxy nodes ensuring scalability regarding the nodes adjacent to the updated ancestor nodes. We show that the directed-acyclic graph-based key management that implements proxy nodes, leads to a constant number of encryption steps for newly created key materials outgoing from the updated node entity. This proceeding results in a constant overhead related to the number of affected and updated node entities.
eng
dc.description.versionpublished
dc.identifier.ppn356180573deu
dc.identifier.urihttp://kops.uni-konstanz.de/handle/123456789/17522
dc.language.isoengdeu
dc.legacy.dateIssued2012-01-10deu
dc.rightsterms-of-usedeu
dc.rights.urihttps://rightsstatements.org/page/InC/1.0/deu
dc.subjectStorage encryptiondeu
dc.subjectgroup securitydeu
dc.subjecttree-based storagedeu
dc.subjectproxy nodesdeu
dc.subjectDAGdeu
dc.subject.ddc004deu
dc.subject.gndZugriffskontrolledeu
dc.subject.gndAuthentifikationdeu
dc.subject.gndDatensicherungdeu
dc.titleVersatile Group Security for Tree-Based Storageeng
dc.typeMSC_THESISdeu
dspace.entity.typePublication
kops.citation.bibtex
@mastersthesis{Lang2012Versa-17522,
  year={2012},
  title={Versatile Group Security for Tree-Based Storage},
  author={Lang, Patrick}
}
kops.citation.iso690LANG, Patrick, 2012. Versatile Group Security for Tree-Based Storage [Master thesis]deu
kops.citation.iso690LANG, Patrick, 2012. Versatile Group Security for Tree-Based Storage [Master thesis]eng
kops.citation.rdf
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/17522">
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:abstract xml:lang="eng">The need to encrypt data in infrastructures containing thousands and thousands of entities having different access rights increases with the rapid growth of electronically stored sensitive data in all areas of business and life. A group-oriented communication system referred to as hierarchical access control is a main part of such an infrastructure. It forms a graph hierarchy in order to bind access rights to group nodes on different levels. Clients are able to join group nodes for getting permission in order to decrypt data which is encrypted with the corresponding group key. Each client maintains a key set contaning an own client key and all keys binded to groups the client is assigned to. Keys need to be renewed when a group affiliation changes, so that leaving clients are not able to decrypt group data anymore. In order not to re-encrypt data by using a renewed key, all keys are versioned and stored, so that the complete key graphs can be restored again. To sent renewed keys over an untrusted component (i.e. a server maintaining the key graph including the corresponding keys and a client holding a sub-key set), the new keys are encrypted with a key that is already known by the client.&lt;br /&gt;&lt;br /&gt;This thesis describes an architecture for a revision-aware encryption framework on versioned data using a directed-acyclic key graph for hierarchical group management based on the VersaKey -approach. Previous approaches base on tree key graphs and provide only one top access right. Our approach enables multiple root instances connecting several key graph hierarchies. The key graph operates join and leave updates without re-encrypting storage data. The usage of a directed-acyclic key graph brings along more flexibility in key graph structure and group affiiations compared to binary tree hierarchies. On the other hand, this flexibility leads to an uncontrolled key graph expansion, key graph unbalance and non-linear scaling in key encryption. Proxy nodes are inserted&lt;br /&gt;which act as auxiliary nodes to avoid those drawbacks. Inserted proxy nodes are only part of the key management hierarchy and do not encrypt storage data.&lt;br /&gt;&lt;br /&gt;The major aspect of this work is to make the versioned key management scalable even on updates affecting many node entities. Therefore, we examine and describe the directed-acyclic key graph management in detail and introduce proxy nodes ensuring scalability regarding the nodes adjacent to the updated ancestor nodes. We show that the directed-acyclic graph-based key management that implements proxy nodes, leads to a constant number of encryption steps for newly created key materials outgoing from the updated node entity. This proceeding results in a constant overhead related to the number of affected and updated node entities.</dcterms:abstract>
    <dc:rights>terms-of-use</dc:rights>
    <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/>
    <dc:contributor>Lang, Patrick</dc:contributor>
    <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/17522/1/thesis_lang.pdf"/>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2012-01-10T09:40:00Z</dcterms:available>
    <dc:language>eng</dc:language>
    <dcterms:issued>2012</dcterms:issued>
    <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/17522"/>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:title>Versatile Group Security for Tree-Based Storage</dcterms:title>
    <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/17522/1/thesis_lang.pdf"/>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2012-01-10T09:40:00Z</dc:date>
    <dc:creator>Lang, Patrick</dc:creator>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
  </rdf:Description>
</rdf:RDF>
kops.description.openAccessopenaccessgreen
kops.identifier.nbnurn:nbn:de:bsz:352-175225deu
kops.submitter.emailpatrick.3.lang@uni-konstanz.dedeu
relation.isAuthorOfPublicationc4f18a2c-1d6e-43fc-bbd8-9b8eabb5fde3
relation.isAuthorOfPublication.latestForDiscoveryc4f18a2c-1d6e-43fc-bbd8-9b8eabb5fde3

Dateien

Originalbündel

Gerade angezeigt 1 - 1 von 1
Vorschaubild nicht verfügbar
Name:
thesis_lang.pdf
Größe:
1.35 MB
Format:
Adobe Portable Document Format
thesis_lang.pdf
thesis_lang.pdfGröße: 1.35 MBDownloads: 212

Lizenzbündel

Gerade angezeigt 1 - 1 von 1
Vorschaubild nicht verfügbar
Name:
license.txt
Größe:
1.92 KB
Format:
Plain Text
Beschreibung:
license.txt
license.txtGröße: 1.92 KBDownloads: 0