TY - GEN
T1 - Comparative analysis of cryptographic key management systems
AU - Kuzminykh, Levgeniia
AU - Ghita, Bogdan
AU - Shiaeles, Stavros
N1 - Funding Information:
This project has received funding from the European Union Horizon 2020 research and innovation programme under grant agreement no. 786698 and no. 833673. This work reflects authors view and Agency is not responsible for any use that may be made of the information it contains.
Publisher Copyright:
© Springer Nature Switzerland AG 2020.
Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.
PY - 2020/12/22
Y1 - 2020/12/22
N2 - Managing cryptographic keys can be a complex task for an enterprise and particularly difficult to scale when an increasing number of users and applications need to be managed. In order to address scalability issues, typical IT infrastructures employ key management systems that are able to handle a large number of encryption keys and associate them with the authorized requests. Given their necessity, recent years have witnessed a variety of key management systems, aligned with the features, quality, price and security needs of specific organisations. While the spectrum of such solutions is welcome and demonstrates the expanding nature of the market, it also makes it time consuming for IT managers to identify the appropriate system for their respective company needs. This paper provides a list of key management tools which include a minimum set of features, such as availability of secure database for managing keys, an authentication, authorization, and access control model for restricting and managing access to keys, effective logging of actions with keys, and the presence of an API for accessing functions directly from the application code. Five systems were comprehensively compared by evaluating the attributes related to complexity of the implementation, its popularity, linked vulnerabilities and technical performance in terms of response time and network usage. These were Pinterest Knox, Hashicorp Vault, Square Keywhiz, OpenStack Barbican, and Cyberark Conjur. Out of these five, Hachicorp Vault was determined to be the most suitable system for small businesses.
AB - Managing cryptographic keys can be a complex task for an enterprise and particularly difficult to scale when an increasing number of users and applications need to be managed. In order to address scalability issues, typical IT infrastructures employ key management systems that are able to handle a large number of encryption keys and associate them with the authorized requests. Given their necessity, recent years have witnessed a variety of key management systems, aligned with the features, quality, price and security needs of specific organisations. While the spectrum of such solutions is welcome and demonstrates the expanding nature of the market, it also makes it time consuming for IT managers to identify the appropriate system for their respective company needs. This paper provides a list of key management tools which include a minimum set of features, such as availability of secure database for managing keys, an authentication, authorization, and access control model for restricting and managing access to keys, effective logging of actions with keys, and the presence of an API for accessing functions directly from the application code. Five systems were comprehensively compared by evaluating the attributes related to complexity of the implementation, its popularity, linked vulnerabilities and technical performance in terms of response time and network usage. These were Pinterest Knox, Hashicorp Vault, Square Keywhiz, OpenStack Barbican, and Cyberark Conjur. Out of these five, Hachicorp Vault was determined to be the most suitable system for small businesses.
KW - Cryptography
KW - Key distribution
KW - Key management service
KW - Secret handling
UR - http://www.scopus.com/inward/record.url?scp=85101972688&partnerID=8YFLogxK
UR - http://www.new2an.org/#/
U2 - 10.1007/978-3-030-65729-1_8
DO - 10.1007/978-3-030-65729-1_8
M3 - Conference contribution
AN - SCOPUS:85101972688
SN - 9783030657284
T3 - Lecture Notes in Computer Science
SP - 80
EP - 94
BT - Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 20th International Conference, NEW2AN 2020 and 13th Conference, ruSMART 2020, Proceedings
A2 - Galinina, Olga
A2 - Andreev, Sergey
A2 - Balandin, Sergey
A2 - Koucheryavy, Yevgeni
PB - Springer
T2 - 20th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2020 and 13th Conference on the Internet of Things and Smart Spaces, ruSMART 2020
Y2 - 26 August 2020 through 28 August 2020
ER -