End-to-end policy based encryption techniques for multi-party data management

  • Authors:
  • Michael Beiter;Marco Casassa Mont;Liqun Chen;Siani Pearson

  • Affiliations:
  • Chief Technology Office, HP Printing and Personal Systems, Fort Collins, USA;Cloud and Security Lab, HP Labs, Bristol, UK;Cloud and Security Lab, HP Labs, Bristol, UK;Cloud and Security Lab, HP Labs, Bristol, UK

  • Venue:
  • Computer Standards & Interfaces
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

We describe a data management solution and associated key management approaches to provide accountability within service provision networks, in particular addressing privacy issues in cloud computing applications. Our solution involves machine readable policies that stick to data to define allowed usage and obligations as data travels across multiple parties. Service providers have fine-grained access to specific data based on agreed policies, enforced by interactions with independent third parties that check for policy compliance before releasing decryption keys required for data access. We describe alternative solutions based upon Public Key Infrastructure (PKI), Identity Based Encryption (IBE) and advanced secret sharing schemes.