CN114003927A - System and method for realizing cloud platform key management - Google Patents

System and method for realizing cloud platform key management Download PDF

Info

Publication number
CN114003927A
CN114003927A CN202111224932.0A CN202111224932A CN114003927A CN 114003927 A CN114003927 A CN 114003927A CN 202111224932 A CN202111224932 A CN 202111224932A CN 114003927 A CN114003927 A CN 114003927A
Authority
CN
China
Prior art keywords
key
key management
cloud platform
service unit
end micro
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111224932.0A
Other languages
Chinese (zh)
Inventor
张栋梁
刘李豪
田雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Cloud Information Technology Co Ltd
Original Assignee
Inspur Cloud Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Cloud Information Technology Co Ltd filed Critical Inspur Cloud Information Technology Co Ltd
Priority to CN202111224932.0A priority Critical patent/CN114003927A/en
Publication of CN114003927A publication Critical patent/CN114003927A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a system and a method for realizing cloud platform key management, and belongs to the technical field of cloud computing pass. The system for realizing cloud platform key management comprises a front-end micro-service unit, a rear-end micro-service unit and an infrastructure micro-service unit; the front-end micro-service unit is used for interacting with a user, receiving user configuration, forwarding to the service logic layer for processing and presenting a processing result to the user; the back-end micro-service unit comprises a secret key module and an encryption and decryption module; the infrastructure microserver is based on operating on a Barbican component, which is an open source OpenStack component. The system for realizing cloud platform key management is simple, reliable, safe and compliant in data encryption protection capability, has multiple integrations, is easy to use, and has good popularization and application values.

Description

System and method for realizing cloud platform key management
Technical Field
The invention relates to the technical field of cloud computing pass, and particularly provides a system and a method for realizing cloud platform key management.
Background
With the continuous progress of society and the rapid development of social economy, various technologies are also rapidly advanced. The computer has the advantages of large information storage capacity, convenience and quickness in information acquisition and the like, and is widely applied. With the continuous improvement of the demands of users, cloud computing technology is developed. With the rapid development of cloud computing technology, more and more enterprises and individuals migrate applications from a traditional computing center to a cloud center, more and more applications are deployed on a cloud platform, the security requirement on cloud data is increased day by day, meanwhile, various certifications such as "cloud service user data protection capability assessment (public/private)" also take data encryption as an important evaluation index, and the cloud data encryption is of great importance.
Disclosure of Invention
The technical task of the invention is to provide a simple, reliable, safe and compliant data encryption protection capability, and a system for realizing cloud platform key management with multiple integration and easy use, aiming at the problems.
A further technical task of the present invention is to provide a method for implementing cloud platform key management.
In order to achieve the purpose, the invention provides the following technical scheme:
a system for realizing cloud platform key management comprises a front-end micro service unit, a rear-end micro service unit and an infrastructure micro service unit;
the front-end micro-service unit is used for interacting with a user, receiving user configuration, forwarding to the service logic layer for processing and presenting a processing result to the user;
the back-end micro-service unit comprises a secret key module and an encryption and decryption module;
the infrastructure microservice unit is implemented based on Barbican and is used for managing the life cycle of the key cryptograph. Barbican is an open source group of OpenStack devices.
Preferably, the key module of the back-end micro service unit includes creation of a key, instance query of the key, asymmetric public key query, and rotation and destruction of the key.
Preferably, the encryption and decryption module of the back-end micro service unit is used for encrypting and decrypting data and signing, and comprises data encryption, data decryption, data signing and signature verification.
Preferably, the created instance of the key only contains information of the instance of the key, excluding the cipher text of the key, which is stored in the Barbican of the infrastructure microservice unit.
Preferably, the key is destroyed by setting a deletion grace period for decryption of the encrypted data.
Preferably, the grace period is not less than seven days.
Preferably, the key round sets a round period by using a timing task, when triggered, the key instance remains unchanged, and the key management internally creates and updates the underlying key ciphertext and generates a version corresponding to the key ciphertext.
The following security goals can be achieved through key round provided by key management:
1. reducing the amount of data encrypted per key
The manner in which keys are encrypted is changed by periodically rotating the keys, which may result in each key having a higher security threshold and a smaller cryptanalysis attack surface.
2. Forming logical isolation of data
The round-robin encryption key enables ciphertext data generated before and after the round robin to form a virtual isolation effect. Security events for a particular key can be quickly defined to affect scope, and further measures can be taken.
3. Reducing time window for key cracking
If on the basis of the regular round-robin encryption keys, ciphertext data generated by the old encryption key is round-robin encrypted by the new encryption key, the round-robin period is a decryption time window of the key. This means that data can only be accessed if the crack is completed between two round-robin events.
The key types supported in the key management service are: the international keys AES 256 and RSA 1024; a domestic secret key: SM2, SM3 and SM 4. Where AES and RSA are created and stored by barbican in infrastructure services. While SM2, SM3, and SM4 are created for backend microservices, stored by barbican
The invention discloses a method for realizing cloud platform key management, which is realized based on the system for realizing cloud platform key management. The bottom layer uses an open-source OpenStack component Barbican to realize the creation and storage of partial secret keys, different types of secret keys are created according to tenant requirements, a user is supported to import own secret keys, and management is carried out through secret key management service.
Preferably, the method supports the cloud product to perform encryption protection on the managed user data in a party integration mode.
Preferably, when the cloud product is docked to use the key management service, the front-end micro service unit and the back-end micro service unit are docked, the cloud product creates a key of a required type through the front-end micro service unit managed by using the key, the key management provides key instance information, and when data encryption and decryption are performed, encryption and decryption operations of the data are performed by calling the SDK provided by the key management back-end micro service unit or the key management.
Compared with the prior art, the method for realizing cloud platform key management has the following outstanding beneficial effects: according to the method for realizing cloud platform key management, data in a cloud product is encrypted by using a server side of the cloud product, the encrypted data is stored in an application, an encryption key is stored in a key management service, the key and the data are respectively stored, the cloud data is more effectively protected, the ability of controlling the cloud computing and storage environment is provided by a cloud product integrated key management service encryption mode, computing and storage resources are isolated and protected in a distributed multi-tenant system, the distributed computing environment or the storage environment is controlled by controlling the life cycle, the use state or an access control authority strategy of the key in key management, and the method has good popularization and application values.
Drawings
FIG. 1 is an architecture diagram of a system for implementing cloud platform key management in accordance with the present invention;
fig. 2 is a flowchart of a method for implementing key management of a cloud platform according to the present invention.
Detailed Description
The system and method for implementing cloud platform key management according to the present invention will be described in further detail with reference to the accompanying drawings and embodiments.
Examples
As shown in fig. 1, the system for implementing cloud platform key management of the present invention includes a front-end micro service unit, a back-end micro service unit, and an infrastructure micro service unit.
The front-end micro-service unit is a front-end micro-service kms-front module and is used for interacting with a user, receiving user configuration, forwarding to a service logic layer for processing and presenting a processing result to the user.
The back-end micro-service unit is a back-end micro-service kms-service module and comprises a secret key module and an encryption and decryption module.
The key module of the back-end micro-service unit comprises creation of a key, instance query of the key, asymmetric public key query, and rotation and destruction of the key. The encryption and decryption module is used for encrypting and decrypting data and signing, and comprises data encryption, data decryption, data signing and signature verification.
The created instance of the key only contains information of the instance of the key, not the key cryptogram, which is stored in the Barbican of the infrastructure microservice unit.
When the secret key is destroyed, a deletion grace period is set for the decryption operation of the encrypted data. Wherein the grace period is not less than seven days.
The key rotation utilizes a timing task to set a rotation period, when triggered, the key instance is kept unchanged, and the key management internally creates and updates the bottom layer key ciphertext and generates a version corresponding to the key ciphertext.
The following security goals can be achieved through key round provided by key management:
1. reducing the amount of data encrypted per key
The manner in which keys are encrypted is changed by periodically rotating the keys, which may result in each key having a higher security threshold and a smaller cryptanalysis attack surface.
2. Forming logical isolation of data
The round-robin encryption key enables ciphertext data generated before and after the round robin to form a virtual isolation effect. Security events for a particular key can be quickly defined to affect scope, and further measures can be taken.
3. Reducing time window for key cracking
If on the basis of the regular round-robin encryption keys, ciphertext data generated by the old encryption key is round-robin encrypted by the new encryption key, the round-robin period is a decryption time window of the key. This means that data can only be accessed if the crack is completed between two round-robin events.
The infrastructure microserver is based on operating on a Barbican component, which is an open source OpenStack component.
The method for realizing the cloud platform key management is realized based on a system for realizing the cloud platform key management. The bottom layer uses an open-source OpenStack component Barbican to realize the creation and storage of partial secret keys, different types of secret keys are created according to tenant requirements, a user is supported to import own secret keys, and management is carried out through secret key management service.
The method for realizing the cloud platform key management supports the cloud product to encrypt and protect the managed user data in a party integration mode. When a cloud product is in butt joint with a key management service, a front-end micro service unit and a rear-end micro service unit are in butt joint, the cloud product creates a key of a required type through the front-end micro service unit managed by the key, key example information is provided through key management, and when data encryption and decryption are carried out, encryption and decryption operations of the data are carried out through calling the SDK provided by the key management rear-end micro service unit or the key management.
The above-described embodiments are merely preferred embodiments of the present invention, and general changes and substitutions by those skilled in the art within the technical scope of the present invention are included in the protection scope of the present invention.

Claims (10)

1. A system for realizing cloud platform key management is characterized in that: the system comprises a front-end micro-service unit, a rear-end micro-service unit and an infrastructure micro-service unit;
the front-end micro-service unit is used for interacting with a user, receiving user configuration, forwarding to the service logic layer for processing and presenting a processing result to the user;
the back-end micro-service unit comprises a secret key module and an encryption and decryption module;
the infrastructure microservice unit is implemented based on Barbican and is used for managing the life cycle of the cipher key cryptograph.
2. The system for implementing cloud platform key management of claim 1, wherein: the key module of the back-end micro-service unit comprises creation of a key, instance query of the key, asymmetric public key query and rotation and destruction of the key.
3. The system for implementing cloud platform key management of claim 1, wherein: and the encryption and decryption module of the back-end micro service unit is used for encrypting and decrypting data and signing, and comprises data encryption, data decryption, data signing and signature verification.
4. The system for implementing cloud platform key management of claim 3, wherein: the created instance of the key only contains information of the instance of the key, not the key cryptogram, which is stored in the Barbican of the infrastructure microservice unit.
5. The system for implementing cloud platform key management of claim 4, wherein: when the secret key is destroyed, a deletion grace period is set for the decryption operation of the encrypted data.
6. The system for implementing cloud platform key management of claim 5, wherein: the grace period is not less than seven days.
7. The system for implementing cloud platform key management of claim 6, wherein: the key rotation utilizes a timing task to set a rotation period, when the rotation period is triggered, the key instance is kept unchanged, the key management internally creates and updates the bottom layer key ciphertext, and generates the version corresponding to the key ciphertext.
8. A method for realizing cloud platform key management is characterized in that: the method is realized based on any one of claims 1 to 7, and is implemented by a system for realizing cloud platform key management, wherein the bottom layer uses an open-source OpenStack component Barbican to realize the creation and storage of partial keys, different types of keys are created according to tenant requirements, and a user is supported to import own keys and manage the keys through a key management service.
9. The method of claim 8, wherein the cloud platform key management is performed by: the method supports the cloud product to carry out encryption protection on the managed user data in a party integration mode.
10. The method of implementing cloud platform key management of claim 9, wherein: when a cloud product is in butt joint with a key management service, a front-end micro service unit and a rear-end micro service unit are in butt joint, the cloud product creates a key of a required type through the front-end micro service unit managed by the key, key example information is provided through key management, and when data encryption and decryption are carried out, encryption and decryption operations of the data are carried out through calling the SDK provided by the key management rear-end micro service unit or the key management.
CN202111224932.0A 2021-10-21 2021-10-21 System and method for realizing cloud platform key management Pending CN114003927A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111224932.0A CN114003927A (en) 2021-10-21 2021-10-21 System and method for realizing cloud platform key management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111224932.0A CN114003927A (en) 2021-10-21 2021-10-21 System and method for realizing cloud platform key management

Publications (1)

Publication Number Publication Date
CN114003927A true CN114003927A (en) 2022-02-01

Family

ID=79923351

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111224932.0A Pending CN114003927A (en) 2021-10-21 2021-10-21 System and method for realizing cloud platform key management

Country Status (1)

Country Link
CN (1) CN114003927A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598757A (en) * 2022-03-17 2022-06-07 浪潮云信息技术股份公司 Cloud native country secret key management method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598757A (en) * 2022-03-17 2022-06-07 浪潮云信息技术股份公司 Cloud native country secret key management method
CN114598757B (en) * 2022-03-17 2024-06-18 浪潮云信息技术股份公司 Cloud-primary national secret key management method

Similar Documents

Publication Publication Date Title
US7711120B2 (en) Cryptographic key management
CN103268456A (en) Method and device for file safety control
US11783091B2 (en) Executing entity-specific cryptographic code in a cryptographic coprocessor
Murala et al. Secure dynamic groups data sharing with modified revocable attribute-based encryption in cloud
CN107911221B (en) Key management method for secure storage of solid-state disk data
Shen et al. SecDM: Securing data migration between cloud storage systems
Singh et al. Hybrid two-tier framework for improved security in cloud environment
CN110932855A (en) Quantum key distribution method based on block chain
CN114003927A (en) System and method for realizing cloud platform key management
CN103379103A (en) Linear encryption and decryption hardware implementation method
CN110750326B (en) Disk encryption and decryption method and system for virtual machine
US20210111901A1 (en) Executing entity-specific cryptographic code in a trusted execution environment
Senthil Kumari et al. Key derivation policy for data security and data integrity in cloud computing
CN108173880B (en) File encryption system based on third party key management
CN110502911A (en) A kind of method, equipment and storage medium based on Faas cloud service configuration vFPGA
Jun et al. Trusted full disk encryption model based on TPM
Jang-Jaccard et al. Portable key management service for cloud storage
CN107343008A (en) A kind of data safety isolation of anti-access module leakage is with sharing implementation method
Tian et al. A trusted control model of cloud storage
Basu et al. Secured cloud storage scheme using ECC based key management in user hierarchy
Taylor et al. Security approaches and crypto algorithms in mobile cloud storage environment to ensure data security
Sánchez‐Artigas et al. StackSync: Attribute‐based data sharing in file synchronization services
Verma et al. Light weight encryption technique for group communication in cloud computing environment
CN116846547B (en) Quantum technology-based political data cross-domain secure transmission method
Vinothkumar et al. A comprehensive study of cryptography and key management based security in cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination