<calendar>
<EncryptedKey Id="CK1">
...
</EncryptedKey>
<Event>
<Date>11.04.2011, 12:00</Date>
<EncryptedData>
...
</EncryptedData>
</Event>
</calendar>
Encrypted
Document Key
Document Key
Cloud
Client
XML Encryption Engine
microSD Card
Cluster 1
<calendar>
<Event>
<Date>11.04.2011, 12:00</Date>
<Note enc=”CK1”>note...</Note>
</Event>
</calendar>
Calendar Application
Figure 5: An example data flow.
data is sent again through the middleware to the XML
server.
In order to encrypt the appropriate data before
sending to the XML server, the data dedicated for the
encryption process has to be indicated. For this pur-
pose, the application adds specific attributes to the el-
ements that will be encrypted. In our example, we use
the attribute enc="CK1" meaning that the marked part
of the note must be encrypted with cluster key CK1.
7 CONCLUSIONS & FUTURE
WORK
The proposed solution provides a convenient way to-
wards secure data storage in the cloud without the
necessity of trust relationships between the storage
provider and the mobile client. Furthermore, the Sec
2
concept integrates transparent into existing architec-
tures with little to no changes concerning cloud in-
frastructures. Control over stored data is given back
to the cluster domains, instead of relying on trust re-
lationships and cloud storage encryption.
With upcoming steps, we are researching on op-
tions for extending the concept to a scenario without
the need of a trustworthy Key Server.
REFERENCES
Cantor, Kemp, Philpott, and Maler (2005). Assertions and
Protocols for the OASIS Security Assertion Markup
Language (SAML) V2.0. Technical report.
Dierks, T. and Rescorla, E. (2008). RFC 5246 - The Trans-
port Layer Security (TLS) Protocol Version 1.2. Tech-
nical report, Network Working Group.
Eastlake, Reagle, Imamura, Dillaway, and Simon (2002).
XML Encryption Syntax and Processing. Technical
report.
Eastlake, Reagle, Solo, Hirsch, Roessler, Bartel, Boyer,
Fox, LaMacchia, and Simon (2008). XML Signature
Syntax and Processing (Second Edition). Technical
report.
Elkins, M., Torto, D. D., Levien, R., and Roessler, T.
(2001). MIME Security with OpenPGP. RFC 3156
(Proposed Standard).
Jensen and Meyer (2011). Expressiveness Considerations of
XML Signatures. In SAPSE 2011: IEEE International
Workshop on Security Aspects of Process and Services
Engineering.
Kamara, S. and Lauter, K. (2010). Cryptographic Cloud
Storage. In Financial Cryptography and Data Secu-
rity. Springer Berlin / Heidelberg, Berlin, Heidelberg.
Kent, S. and Seo, K. (2005). RFC 4301 - Security Architec-
ture for the Internet Protocol. Technical report, Net-
work Working Group.
Molnar, D. and Schechter, S. (2010). Self hosting vs. cloud
hosting: Accounting for the security impact of hosting
in the cloud. In Proceedings of the Ninth Workshop on
the Economics of Information Security (WEIS).
Ramsdell, B. (2004). Secure/Multipurpose Internet Mail
Extensions (S/MIME) Version 3.1 Message Specifi-
cation. RFC 3851 (Proposed Standard). Obsoleted by
RFC 5751.
Tran, T., Yousaf, F. Z., and Wietfeld, C. (2010). Csh-
mu: Client based secure handoff solution for mobile
units. In The 21st IEEE International Symposium on
Personal, Indoor and Mobile Radio Communication
(PIMRC), Istanbul, Turkey. IEEE.
Wang, S.-C., Yan, K.-Q., Liao, W.-P., and Wang, S.-S.
(2010). Towards a load balancing in a three-level
cloud computing network. In Computer Science and
Information Technology (ICCSIT), 2010 3rd IEEE In-
ternational Conference on, volume 1, pages 108 –113.
Wu, J., Ping, L., Ge, X., Wang, Y., and Fu, J. (2010).
Cloud storage as the infrastructure of cloud comput-
ing. In Proceedings of the 2010 International Con-
ference on Intelligent Computing and Cognitive Infor-
matics, ICICCI ’10, pages 380–383, Washington, DC,
USA. IEEE Computer Society.
Zhang, S., Zhang, S., Chen, X., and Huo, X. (2010). Cloud
computing research and development trend. In Pro-
ceedings of the 2010 Second International Conference
on Future Networks, ICFN ’10, pages 93–97, Wash-
ington, DC, USA. IEEE Computer Society.
APPENDIX
Our work has been conducted within the Sec
2
project
10
, which is funded by the German Federal
Ministry of Education and Research (BMBF).
We would like to thank Benedikt Driessen and
Florian Kohlar for their contributions.
10
http://www.sec2.org
SeC2:SECUREMOBILESOLUTIONFORDISTRIBUTEDPUBLICCLOUDSTORAGES
561