Table 1 Conditions of the trusted server in our experiment. Similar requirements of hardware security module (HSM) defined in FIPS140-2 would be required as the conditions to be “a trusted server.” Refer to the HSM requirements, conditions listed in Table 1 were implemented in this demonstration.
From: Secure secondary utilization system of genomic data using quantum secure cloud
1 | Access rights to the server are strictly managed |
2 | In the case of external connection, hardware authentication must be carried out in an information theoretically secure manner |
3 | A protected area of a certain capacity (e.g. 1 GB) can be assumed in the server |
4 | Do not store unencrypted data in the protected area of the server for long periods (e.g. 24 h or more) |
5 | Must be installed in a server room with strict access control |
6 | Unnecessary external interface is disabled |
7 | If you want to store data outside for a long time, carry out secret sharing |
8 | OTP encryption when transmitting data to the outside |
9 | Make sure to erase the random numbers used for encryption and secret sharing |
10 | Use a random number source that does not have periodicity, such as a physical / quantum random number generator |
11 | Other security on general information systems such as intrusion detection system (IDS) and intrusion prevention system (IPS) should be applied |