Proof of outsourced encryption: cross verification of security service level agreement
- PDF / 2,659,459 Bytes
- 16 Pages / 595.276 x 790.866 pts Page_size
- 112 Downloads / 199 Views
REGULAR PAPER
Proof of outsourced encryption: cross verification of security service level agreement Sultan Alasmari1 · Weichao Wang1 · Tuanfa Qin2 · Yu Wang3 Received: 9 January 2020 / Accepted: 3 November 2020 / Published online: 24 November 2020 © China Computer Federation (CCF) 2020
Abstract With the popularity of cloud and edge computing, user data is often stored at third party service providers. Restricted by the available resources, end users may need to outsource the data encryption operations. However, the security service level agreement (SSLA) are usually hard to verify since it is fairly hard for end users to learn the data status at the service providers. In this paper, we investigate the proof of outsourced encryption problem. We first define the expected properties of the proof of encryption (PoE) mechanisms. Depending on the negotiated encryption algorithm in SSLA, we design two verification mechanisms so that end users can query encryption results at service providers to verify the enforcement of SSLA even when they are not aware of the keys. We formally analyze the protocols with BAN logic. Simulation and experiments show that our approaches can detect a dishonest service provider with high probability. Keywords Proof of Encryption · Security Service Level Agreement · User Initiated Verification
1 Introduction
Paper Statement: This paper is an extension of the paper “Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption” Alasmari et al. (2019) that was originally published in IEEE IDSC 2019. Section 1 to Section 3.3, Section 4.1 and 4.2 of the journal paper are the same as our conference paper. Section 3.4, 3.5, 4.3, and 4.4 are new contributions. The original conference paper studied the POE problem in symmetric encryption environments. The new extension focuses on the POE problem in asymmetric encryption environments, the proof of its safety, its difference from public auditing of cloud storage, and performance evaluation. * Weichao Wang [email protected] Sultan Alasmari [email protected] Tuanfa Qin [email protected] Yu Wang [email protected] 1
College of Computing and Informatics, UNC Charlotte, Charlotte, NC 28223, USA
2
Multimedia Key Lab, Guangxi University, Nanning, China
3
CIS Department, Temple University, Philadelphia, PA 19122, USA
With the fast development and deployment of cloud and edge computing, a large portion of data processing and storage operations are outsourced to various types of service providers. For example, according to Forbes, about 77% of enterprises have at least one application or a portion of their enterprise computing infrastructure in the cloud. Service providers and cloud customers often use service level agreement (SLA) to determine the committed resources or responsibilities of different parties (Sfondrini et al. 2015). Since service providers often charge end users based on the amount of resources that they use (e.g. CPU cycles, network bandwidth, and memory), verification mechanisms have been designed so that
Data Loading...