Key management for encrypted storage on a grid

Abstract Data grids provide data owners with a tremendous volume of data storage capacity. Sensitive data stored on a grid is vulnerable to unauthorized disclosure because grids are an open environment. Encrypting data provides data with confidentiality in storage and in transit. However, if doing so, the main problems are how to store those cryptographic keys safely and how to allow the authorized users to have access to the cryptographic keys. In this paper, a scheme is proposed for data owners to store encrypted data and to share the data with authorized users in an efficient way.

[1]  Ian T. Foster,et al.  The data grid: Towards an architecture for the distributed management and analysis of large scientific datasets , 2000, J. Netw. Comput. Appl..

[2]  L Brunie,et al.  Encrypted storage of medical data on a grid. , 2005, Methods of information in medicine.

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[5]  Johan Montagnat,et al.  A Secure Grid Medical Data Manager Interfaced to the gLite Middleware , 2008, Journal of Grid Computing.

[6]  Philip Zimmermann,et al.  Pretty good privacy: public key encryption for the masses , 1995 .

[7]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[8]  Lionel Brunie,et al.  Key Management for Encrypted Data Storage in Distributed Systems , 2003, Second IEEE International Security in Storage Workshop.

[9]  Lein Harn,et al.  Design of generalised ElGamal type digital signature schemes based on discrete logarithm , 1994 .

[10]  Yuan-Shun Dai,et al.  Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups , 2007, Future Gener. Comput. Syst..

[11]  Reagan Moore,et al.  The SDSC storage resource broker , 2010, CASCON.

[12]  Ian T. Foster,et al.  Globus: a Metacomputing Infrastructure Toolkit , 1997, Int. J. High Perform. Comput. Appl..

[13]  Ed Dawson,et al.  Key management in a non-trusted distributed environment , 2000, Future Gener. Comput. Syst..