Low-Cost Distributed Key Management

  title={Low-Cost Distributed Key Management},
  author={Venkatesh Gopal and Shikha Fadnavis and Joel Coffman},
  journal={2018 IEEE World Congress on Services (SERVICES)},
Key management is one of the biggest challenges in cryptography. Traditionally, organizations stored cryptographic keys using file-based storage, which is insecure due to the lack of sufficient authentication. To overcome this issue, industry has moved towards using Hardware Security Modules (HSMs) for storing cryptographic keys. However, storing keys on HSMs does not ensure high availability if they fail due to network outages or lack of sufficient resources. Major cloud offerings provide high… 

Tables from this paper

SEkey: A Distributed Hardware-based Key Management System
SEkey is a key management system developed targeting a distributed environment, where it is possible to identify a single central manager that acts as a Key Distribution Center (KDC) and many users that locally store and manage their own keys.


Data Protection in OpenStack
The design and implementation of several security features in OpenStack are described in detail and a security analysis is provided that enumerates the threats that each mitigates and shows that these security features have an acceptable cost.
Design and Implementation of a TCG-based Integrity Measurement Architecture
This work shows that many of the Microsoft NGSCB guarantees can be obtained on today's hardware and today's software and that these guarantees do not require a new CPU mode or operating system but merely depend on the availability of an independent trusted entity, a TPM for example.
Object-based storage
Object-based storage is described, stressing how it improves data sharing, security, and device intelligence and some industry applications and academic research using objects as a foundation for building even more intelligent storage systems are discussed.
How to share a secret
  • A. Shamir
  • Computer Science, Mathematics
  • 1979
This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
A Practical Guide to TPM 2.0
The book seeks to empower and excite the programming community to use TPMs to help solve the current general security crisis and to educate the general public about TPM 2.0.