Authors:
Florian Reimair
1
;
Johannes Feichtner
2
;
Dominik Ziegler
2
;
Sandra Kreuzhuber
3
and
Thomas Zefferer
4
Affiliations:
1
Secure Information Technology Center - Austria (A-SIT), Austria
;
2
Graz University of Technology, Austria
;
3
PrimeSign GmbH, Austria
;
4
A-Sit Plus GmbH, Austria
Keyword(s):
Applied Cryptography, Cryptographic Service Providers, Cloud.
Related
Ontology
Subjects/Areas/Topics:
Applied Cryptography
;
Cryptographic Techniques and Key Management
;
Data and Application Security and Privacy
;
Data Engineering
;
Data Protection
;
Databases and Data Security
;
Information and Systems Security
;
Information Assurance
;
Risk Assessment
;
Security in Information Systems
;
Security Information Systems Architecture and Design and Security Patterns
;
Security Requirements
Abstract:
Current application and device landscapes became a harsh environment for data security. Multi-device users enjoy the convenience and efficiency of modern distributed applications in a highly heterogeneous device landscape. However, today's data protection mechanisms fell behind in taking care of some current use cases and application scenarios. We perform a case study and an in-depth security analysis and risk assessment on a simplified set of three different cryptographic service provider types; software, hardware, and remote. Our case study shows that different provider types can change application characteristics considerably. Our security analysis and risk assessment shows how different provider types can influence the security properties of a set of use cases. We found that no one provider can excel for every cryptographic task. Based on these findings we formulate a list of features which we believe are crucial to get the data protection mechanisms up to speed again so that eve
ryone can again benefit from data security even in a world of highly distributed applications and data.
(More)