Figure 7: Download Overhead.
sibility of achieving a secure key management fully
controlled by the end cloud customer. Accordingly,
transitive trust is established between the key Man-
agement System on-premise and the SGX appliance
hosted in the cloud. Hence, the suggested KMSGX
allows executing on-premise software key manage-
ment system securely in cloud providers side through
accessible hardware facilities to control sensitive keys
at low cost directly by the end-user.
We strengthen this work by formally proving the
security properties of the protocol using the Applied
Pi Calculus. Thus, we formally proved that the sug-
gested scheme provides authentication of the SGX ap-
pliance, and the secret keys confidentiality of the se-
cret keys. As a future direction, we plan to extend
this work by considering a distributed setting where
multiple nodes or clouds are involved. The aim is to
design a system that operates in an untrusted multi-
cloud environment.
REFERENCES
Abadi, M., Blanchet, B., and Fournet, C. (2017). The ap-
plied pi calculus: Mobile values, new names, and se-
cure communication. Journal of the ACM (JACM),
65(1):1–41.
Amazon (2015). Amazon, cloudhsm.
Benjamin, B., Coffman, et al. (2017). Data protection in
openstack. In 2017 IEEE 10th International Confer-
ence on Cloud Computing, pages 560–567. IEEE.
Bentajer, A. and Hedabou, M. (2020). Cryptographic key
management issues in cloud computing. Advances in
Engineering Research, 34:78–112.
Blanchet, B. (2005). Proverif automatic cryptographic pro-
tocol verifier user manual. CNRS, Departement dIn-
formatique, Ecole Normale Superieure, Paris.
Cervesato, I. (2001). The dolev-yao intruder is the most
powerful attacker. In 16th Annual Symposium on
Logic in Computer Science—LICS, volume 1.
Chakrabarti, S., Baker, B., and Vij, M. (2017). Intel sgx
enabled key manager service with openstack barbican.
arXiv preprint arXiv:1712.07694.
Chokhani, R. C. M. I. S. (2013). Cryptographic key man-
agement issues & challenges in cloud services. Na-
tional Institute of standards and Technology.
Cortier, V. and Kremer, S. (2014). Formal models and tech-
niques for analyzing security protocols: A tutorial.
Foundations and Trends in Programming Languages,
1(3):117.
Diffie, W. and Hellman, M. (1976). New directions in cryp-
tography. IEEE transactions on Information Theory,
22(6):644–654.
ElGamal, T. (1985). A public key cryptosystem and a signa-
ture scheme based on discrete logarithms. IEEE trans-
actions on information theory, 31(4):469–472.
Hamid, L. (2013). Cloud-based hardware security modules.
US Patent App. 13/826,353.
Intel (2017). Intel software guard extensions.
Kaaniche, N., Belguith, et al. (2020). Prov-trust: To-
wards a trustworthy sgx-based data provenance sys-
tem. In Proceedings of the 17th International Joint
Conference on e-Business and Telecommunications,
SECRYPT, pages 225–237. INSTICC.
Kocher, P., Horn, et al. (2019). Spectre attacks: Exploiting
speculative execution. In IEEE Symposium on Secu-
rity and Privacy (SP), pages 1–19. IEEE.
Krawczyk, H. (2003). Sigma: The ‘sign-and-mac’approach
to authenticated diffie-hellman and its use in the ike
protocols. In Annual International Cryptology Con-
ference, pages 400–425. Springer.
Lipp, M., Schwarz, et al. (2018). Meltdown: Reading kernel
memory from user space. In 27th USENIX Security
Symposium, pages 973–990.
Ludlum, R. (2002). The Sigma Protocol. Macmillan.
Mukhtar, M. A., Bhatti, et al. (2019). Architectures for se-
curity: A comparative analysis of hardware security
features in intel sgx and arm trustzone. In 2nd Interna-
tional Conference on Communication, Computing and
Digital systems (C-CODE), pages 299–304. IEEE.
Phegade, V., Schrater, et al. (2017). Self-defending key
management service with intel® software guard ex-
tensions.
Rosen, A. (2012). Analysis of the porticor homomorphic
key management protocol. Porticor Cloud Security.
Sabt, M., Achemlal, et al. (2015). Trusted execution envi-
ronment: what it is, and what it is not. In IEEE Trust-
com/BigDataSE/ISPA, volume 1, pages 57–64. IEEE.
Schneier, B. (2007). Applied cryptography: protocols, al-
gorithms, and source code in C. john wiley & sons.
Sinha, R., Rajamani, et al. (2015). Moat: Verifying con-
fidentiality of enclave programs. In Proceedings of
the 22nd ACM SIGSAC Conference on Computer and
Communications Security, pages 1169–1184.
Subramanyan, P., Sinha, et al. (2017). A formal founda-
tion for secure remote execution of enclaves. In ACM
SIGSAC Conference on Computer and Communica-
tions Security, pages 2435–2450.
Van, Bulck, J., Minkin, et al. (2018). Foreshadow: Ex-
tracting the keys to the intel sgx kingdom with tran-
sient out-of-order execution. In 27th USENIX Security
Symposium, pages 991–1008.
Cloud Key Management using Trusted Execution Environment
567