TY - GEN
T1 - RESCUE
T2 - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
AU - Ukwandu, Elochukwu
AU - Buchanan, William J.
AU - Fan, Lu
AU - Russell, Gordon
AU - Lo, Owen
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/12/2
Y1 - 2015/12/2
N2 - This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method, self-destruction of data within a time frame without user's intervention, and break-glass data recovery, with in-built failover protection. It aims to overcome many of the current problems within Cloud-based infastructures, such as in the loss of private keys, and inherent failover protection. The architecture uses a secret share method with: an Application Platform, Proxy Servers with Routers, and a Metadata Server. These interact within a multi-cloud environment to provide a robust, secure and dependable system, and which showcases a new direction in an improved cloud computing environment. It aims to ensure user privacy, and reduces the potential for data loss, as well as reducing denial-of-service outages within the cloud, and with failover protection for stored data. In order to assessement the best secret sharing method that could be used for the architecture, the paper outlines a range of experiments on the performance footprint of the most relevant secret sharing schemes.
AB - This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method, self-destruction of data within a time frame without user's intervention, and break-glass data recovery, with in-built failover protection. It aims to overcome many of the current problems within Cloud-based infastructures, such as in the loss of private keys, and inherent failover protection. The architecture uses a secret share method with: an Application Platform, Proxy Servers with Routers, and a Metadata Server. These interact within a multi-cloud environment to provide a robust, secure and dependable system, and which showcases a new direction in an improved cloud computing environment. It aims to ensure user privacy, and reduces the potential for data loss, as well as reducing denial-of-service outages within the cloud, and with failover protection for stored data. In order to assessement the best secret sharing method that could be used for the architecture, the paper outlines a range of experiments on the performance footprint of the most relevant secret sharing schemes.
KW - Break-glass data recovery
KW - Failover protection
KW - Multi-cloud
KW - Secret shares
KW - Self-destruct and keyless encryption
UR - http://www.scopus.com/inward/record.url?scp=84966773953&partnerID=8YFLogxK
U2 - 10.1109/Trustcom.2015.459
DO - 10.1109/Trustcom.2015.459
M3 - Conference contribution
AN - SCOPUS:84966773953
T3 - Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
SP - 872
EP - 879
BT - Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 20 August 2015 through 22 August 2015
ER -