Key rotation techniques

ABSTRACT

A plurality of devices, having common access to a first key under which a set of data objects used by the plurality of devices are encrypted, is caused to replace the first key with a second key by at least causing a device of the plurality of devices to encrypt a subset of the set of data objects that are not selected for electronic shredding, allow access to a data object of the subset regardless of whether the data object is encrypted using the first key or the second key. At a time after the data object becomes accessible by using the second key, each of the plurality of devices is verified have common access to the second key, and the plurality of devices is caused to lose access to the first key.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.13/916,999 filed on Jun. 13, 2013, entitled “KEY ROTATION TECHNIQUES,”which incorporates by reference for all purposes the full disclosure ofco-pending U.S. patent application Ser. No. 13/916,915, filed on Jun.13, 2013, entitled “DEVICE COORDINATION,” and co-pending U.S. patentapplication Ser. No. 13/916,964, filed on Jun. 13, 2013, entitled“NEGOTIATING A SESSION WITH A CRYPTOGRAPHIC DOMAIN.”

BACKGROUND

The security of computing resources and associated data is of highimportance in many contexts. As an example, organizations often utilizenetworks of computing devices to provide a robust set of services totheir users. Networks often span multiple geographic boundaries andoften connect with other networks. An organization, for example, maysupport its operations using both internal networks of computingresources and computing resources managed by others. Computers of theorganization, for instance, may communicate with computers of otherorganizations to access and/or provide data while using services ofanother organization. In many instances, organizations configure andoperate remote networks using hardware managed by other organizations,thereby reducing infrastructure costs and achieving other advantages.With such configurations of computing resources, ensuring that access tothe resources and the data they hold is secure can be challenging,especially as the size and complexity of such configurations grow.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments in accordance with the present disclosure will bedescribed with reference to the drawings, in which:

FIG. 1 shows an illustrative diagram representing various aspects of thepresent disclosure in accordance with various embodiments;

FIG. 2 shows an illustrative example of an environment in which variousaspects of the present disclosure may be implemented;

FIG. 3 shows an illustrative example of an environment in which variousaspects of the present disclosure may be implemented and an example flowof information among the various components of the environment inaccordance with at least one embodiment;

FIG. 4 shows example steps of an illustrative process for storingciphertext, in accordance with at least one embodiment;

FIG. 5 shows an illustrative example of an environment in which variousaspects of the present disclosure may be implemented and an example flowof information among the various components of the environment inaccordance with at least one embodiment;

FIG. 6 shows example steps of an illustrative process for responding toa request to retrieve data, in accordance with at least one embodiment;

FIG. 7 shows an illustrative example of an environment in which variousaspects of the present disclosure may be implemented and an example flowof information among the various components of the environment inaccordance with at least one embodiment;

FIG. 8 shows example steps of an illustrative process for responding toa request to store data, in accordance with at least one embodiment;

FIG. 9 shows an illustrative example of an environment in which variousaspects of the present disclosure may be implemented and an example flowof information among the various components of the environment inaccordance with at least one embodiment;

FIG. 10 shows example steps of an illustrative process for responding toa request to retrieve data, in accordance with at least one embodiment;

FIG. 11 shows an illustrative example of an environment in which variousaspects of the present disclosure may be implemented;

FIG. 12 shows an illustrative example of an environment in which variousaspects of the present disclosure may be implemented and an example flowof information among the various components of the environment inaccordance with at least one embodiment;

FIG. 13 shows example steps of an illustrative process for responding toa request to retrieve data, in accordance with at least one embodiment;

FIG. 14 shows example steps of an illustrative process for responding toa request to decrypt data, in accordance with at least one embodiment;

FIG. 15 shows example steps of an illustrative process for obtainingdecrypted data, in accordance with at least one embodiment;

FIG. 16 shows a diagrammatic representation of an example cryptographyservice, in accordance with at least one embodiment;

FIG. 17 shows an illustrative example of an environment in which variousembodiments may be practiced;

FIG. 18 shows an illustrative example of a representation of a domaintoken, in accordance with at least one embodiment;

FIG. 19 shows an illustrative example of a process for installing acryptographic domain in accordance with at least one embodiment;

FIG. 20 shows an illustrative example of a process for ingesting acryptographic domain in accordance with an embodiment;

FIG. 21 shows an illustrative example of a process for rotating domainkeys in accordance with at least one embodiment;

FIG. 22 shows an illustrative example of an environment in which variousembodiments may be practiced;

FIG. 23 shows an illustrative example of a process for creating andexposing a key in accordance with at least one embodiment;

FIG. 24 shows an illustrative example of a process for obtaining asession key in accordance with at least one embodiment;

FIG. 25 shows an illustrative example of a process for processingrequests using a session key in accordance with at least one embodiment;and

FIG. 26 shows an illustrative example of an environment in which variousembodiments can be practiced.

DETAILED DESCRIPTION

In the following description, various embodiments will be described. Forpurposes of explanation, specific configurations and details are setforth in order to provide a thorough understanding of the embodiments.However, it will also be apparent to one skilled in the art that theembodiments may be practiced without the specific details. Furthermore,well-known features may be omitted or simplified in order not to obscurethe embodiment being described.

Techniques described and suggested herein allow for enhanced datasecurity in environments involving distributed computing resources. Inone example, a distributed computing environment includes one or moredata services which may be implemented by appropriate computingresources. The data services may allow various operations to beperformed in connection with data. As one illustrative example, thedistributed computing environment includes one or more data storageservices. Electronic requests may be transmitted to the data storageservice to perform data storage operations. Example operations areoperations to store data using the data storage service and using thedata storage service to retrieve data stored by the data storageservice. Data services, including data storage services, may alsoperform operations that manipulate data. For example, in someembodiments, a data storage service is able to encrypt data.

Various embodiments of the present disclosure include distributedcomputing environments that include cryptography services that areimplemented using appropriate computing resources. A cryptographyservice may be implemented by a distributed system that receives andresponds to electronic requests to perform cryptographic operations,such as encryption of plaintext and decryption of ciphertext. In someembodiments, a cryptography service manages keys. In response to arequest to perform a cryptographic operation, the cryptography servicemay execute cryptographic operations that use the managed keys. Forexample, the cryptography service can select an appropriate key toperform the cryptographic operation, perform the cryptographicoperation, and provide one or more results of the cryptographicoperation in response to the received request. In an alternativeconfiguration, the cryptography service can produce an envelope key(e.g., a session key that is used to encrypt specific data items) andreturn the envelope key to the system invoking the cryptographicoperations of the service. The system can then use the envelope key toperform the cryptographic operation.

In some embodiments, the cryptography service manages keys for multipletenants of a computing resource service provider. A tenant of thecomputing resource may be an entity (e.g., organization or individual)operating as a customer of the computing resource service provider.

The customer may remotely and programmatically configure and operateresources that are physically hosted by the computing resource serviceprovider. When a customer submits a request to the cryptography serviceto perform a cryptographic operation (or when an entity submits arequest to the cryptography service), the cryptography service mayselect a key managed by the cryptography service for the customer toperform the cryptographic operation. The keys managed by thecryptography service may be securely managed so that other users and/ordata services do not have access to the keys of others. A lack of accessby an entity (e.g., user, customer, service) to the key of anotherentity may mean that the entity does not have an authorized way ofobtaining the key of the other and/or that the entity does not have anauthorized way of causing a system that manages the key of the other ofusing the key at the entity's direction. For example, the cryptographyservice may manage keys so that, for a customer, other customers both donot have access to the customer's key(s) and are unable to cause thecryptography service to use the customer's key(s) to performcryptographic operations.

As another example, the cryptography service may manage keys so thatother services, such as a data storage service, are unable to cause thecryptography service to use some or all keys to perform cryptographicoperations. Unauthorized access to a key may be prevented by appropriatesecurity measures so that, for example, unauthorized access is difficultor impossible. Difficulty may be due to computational impracticalityand/or due to a need for an unauthorized (e.g., illegal, tortious and/orotherwise disallowed such as a compromise of authorization credentials)to occur for access to be gained. Systems in accordance with the variousembodiments may be configured to ensure an objective measure ofcomputational impracticality to gain access to a key. Such measures maybe, for example, measured in terms of an amount of time, on average, itwould take a computer having a defined unit of computational ability(e.g., certain operations per unit of time) to crack encryptedinformation needed for authorized access to the key.

As noted, a cryptography service may receive requests from variousentities, such as customers of a computing resource service provider. Acryptography service may also receive requests from entities internal tothe computing resource service provider. For example, in someembodiments, data services implemented by the computing resource serviceprovider may transmit requests to a cryptography service to cause thecryptography service to perform cryptographic operations. As oneexample, a customer may transmit a request to a data storage service tostore a data object. The request may indicate that the data objectshould be encrypted when stored. The data storage service maycommunicate a request to a cryptography service to perform acryptographic operation. The cryptographic operation may be, forexample, encryption of a key used by the data storage service to encryptthe data object. The cryptographic operation may be encryption of thedata object itself. The cryptographic operation may be to generate anenvelope key that the data storage service can use to encrypt the dataobject.

Systems in accordance with the various embodiments implement varioussecurity measures to provide enhanced data security. For example, invarious embodiments, the manner in which a cryptography service canutilize keys it manages is limited. For example, in some embodiments, acryptography service is configured to only use a key corresponding to acustomer upon appropriate authorization. If a request to use acustomer's key purportedly originates from the customer (i.e., from acomputing device operating on behalf of the customer), the cryptographyservice may be configured to require that the request be electronically(digitally) signed using appropriate credentials owned by the customer.If the request to use the customer's key originated from another dataservice, the cryptography service may be configured to require that thedata service provide proof that a signed request to the data service hasbeen made by the customer. In some embodiments, for example, the dataservice is configured to obtain and provide a token that serves as proofof an authenticated customer request. Other security measures may alsobe built into a configuration of an electronic environment that includesa cryptography service. For example, in some embodiments, a cryptographyservice is configured to limit key use according to context. As oneillustrative example, the cryptography service may be configured to usea key for encryption for requests from a customer or from a data serviceacting on behalf of the customer. However, the cryptography service maybe configured to only use a key for decryption for requests from thecustomer (but not from another data service). In this manner, if thedata service is compromised, the data service would not be able to causethe cryptography service to decrypt data.

Various security measures may be built into a cryptography serviceand/or its electronic environment. Some security measures may be managedaccording to policies which, in some embodiments, are configurable. Asone example, a cryptography service may utilize an applicationprogramming interface (API) that enables users to configure policies onkeys. A policy on a key may be information that, when processed by acryptography service, is determinative of whether the key may be used incertain circumstances. A policy may, for instance, limit identities ofusers and/or systems able to direct use of the key, limit times when thekey can be used, limit data on which the key can be used to performcryptographic operations on, and provide other limitations. The policiesmay provide explicit limitations (e.g., who cannot use the keys) and/ormay provide explicit authorizations (e.g., who can use the keys).Further, policies may be complexly structured to generally provideconditions for when keys can and cannot be used. When a request toperform a cryptographic operation using a key is received, any policieson the key may be accessed and processed to determine if the requestcan, according to policy, be fulfilled.

Various embodiments of the present disclosure include techniques forcoordinating devices to operate with consistent operational parameters.In some examples, the techniques are used to ensure that a group ofsecurity modules comprising a cryptographic domain operate consistently,using the same cryptographic keys and operating within the sameparameters for use of the cryptographic keys, such as the same rules onwhich entities are authorized to cause the performance of cryptographicoperations using the keys.

In various embodiments, an operator initiates a process for putting agroup of security modules into a consistent state. The operator may, insome embodiments, accomplish this by submitting, to a security module, arequest to change one or more parameters for a cryptographic domain. Thesecurity module may encode, in a token, the parameters for thecryptographic domain in accordance with the request. The information maybe encoded so as to enable the security modules in the group to verifythe authenticity of the token and to extract information that has beenencrypted so as to prevent unauthorized access to particularly sensitiveinformation in the token, such as one or more cryptographic keys to bestored and used by the security modules.

In some embodiments, security modules do not update their operationallogic in accordance with changes to a cryptographic domain encoded in atoken until the token has been approved by an entity, which may bereferred to as a coordinator, authorized to approve the token. In someembodiments, any security module in the group is operable to generate atoken.

Accordingly, various techniques may be utilized by the coordinator toensure that a token generated by a security module and provided forapproval does not conflict with another token that was generated by thesame or another security module and provided for approval. In variousembodiments, security modules provide version numbers for cryptographicdomains encoded in tokens. The version number may be based on a currentversion of a cryptographic domain installed on a security module thatgenerated the token. As an example, if a security module currentlyoperates in accordance with version N of a cryptographic domain, thesecurity module may generate a token that proposes a cryptographicdomain with version N+1. In this manner, a coordinator can use theversion numbers to avoid installation of conflicting cryptographicdomains.

For example, if a token encoding a proposed cryptographic domain withversion N+1 is provided to a coordinator for approval, the coordinatorcan check if another token with version N+1 (or greater) has been usedto install an updated cryptographic domain on one or more other securitymodules. If it has, the coordinator can reject (i.e., not use forupdating a cryptographic domain) the new token identifying the versionN+1. In this manner, the coordinator prevents two security modulesoperating with different sets of operational parameters that areidentified by the same version. This prevents, for instance, securitymodules from using different keys when the same key should be used,prevents security modules from enforcing different rules and the like.

When a coordinator receives a token and determines that the token doesnot present a conflict, the coordinator may use the token to update thecryptographic domain. In an embodiment, the coordinator forwards thetoken to each security module in the group including, in someembodiments, the security module that generated the token. A securitymodule may receive the token, perform any necessary authenticationverification, and update its parameters in accordance with informationencoded on the token. The security module can, for instance, update oneor more cryptographic keys, can remove itself from the cryptographicdomain, can add itself to the cryptographic domain, and/or perform otheroperations.

Various embodiments of the present disclosure also enable efficientrotation of cryptographic keys in a distributed environment withoutdisruption of operational abilities. In various embodiments, eachsecurity module utilizes a cryptographic key, referred to as a domainkey, that is common to all the security modules. The security modulesmay, for instance, use the domain keys to encrypt customer keys (keys ofcustomers of a service provider) so that the customer keys can besecurely stored outside of the security modules. When cryptographicoperations are requested to be performed using the customer keys asinput, a security module may use the domain key to decrypt the customerkey, use the decrypted customer key to perform the cryptographicoperations, and provide the results of the cryptographic operationswhich may include ciphertext and/or a digital signature.

To rotate a domain key (which may be referred to as an “old” domainkey), in various embodiments, a new domain key may be added to acryptographic domain, such as by using the process mentioned above anddescribed in more detail below. Customer keys encrypted under the olddomain key may be located, accessed, decrypted using the old domain key,encrypted using the new domain key and loaded back into storage. Once itis determined that the customer keys have been reencrypted using the newdomain key, a process such as mentioned above and described in moredetail below can be used to remove the old domain key from thecryptographic domain. In this manner, during the transition of customerkeys from the old domain key to the new domain key, all security modulesin the cryptographic domain have access to the old domain key until thecustomer keys have been transitioned to the new domain key. Similarly,during the transition, all security modules in the cryptographic domainhave access to the new domain key to be able to access customer keysthat have already transitioned to the new domain key. Variations arealso considered as being within the scope of the present disclosure,such as variations where not all security modules in the cryptographicdomain have access to the new domain key during the transition of thecustomer keys to the new domain key, but where customer keys areselectively provided to security modules having an appropriate domainkey.

The key rotation techniques also enable useful techniques forelectronically shredding customer keys or other data that are encryptedunder a domain key. In various embodiments, for instance, customer keysare stored encrypted under a domain key. Customers may cause some or allof their customer keys to be marked for electronic shredding. Customersmay, for instance, mark the customer keys through appropriatelyconfigured API calls or automatically, such as in accordance with a keyrotation schedule, which may be the result of electronic shreddingpolicies that cause the customer keys to be electronically shredded an atime determined by policy, which may be when one or more conditions aresatisfied, such as the passage of a certain amount of time. In addition,a service provider may rotate keys automatically and, as a result,rotate customer keys unless customers explicitly request otherwise. Whena rotation process for a domain key is performed, customer keys markedfor electronic shredding may be excluded from transition to a new domainkey. Therefore, the customer keys marked for electronic shredding mayremain encrypted under an old domain key while other customer keys arereencrypted to the new domain key. In this manner, when the securitymodules (and any other device(s) with access) lose access to the olddomain key, such as through a process mentioned above and discussed inmore detail below, the ability to decrypt the customer keys encryptedunder the old domain key is lost. In this manner, customers can beensured that the customer keys encrypted under the old domain key cannotpractically be recovered and used for unauthorized purposes.

Various embodiments of the present disclosure also enable for efficientand secure communications with security modules and other devicesthrough the use of session keys. For example, an operator may perform anegotiation with a security module that results in the security moduleproviding, over a secure channel, the operator a session key inplaintext form and encrypted under a domain key used by other securitymodules. The operator may use the session key to encrypt and signrequests that are submitted to any security module having the domain keyunder which the session key is encrypted. The operator may, forinstance, provide any security module (having the domain key) therequest, a digital signature generated based at least in part on therequest and the session key, and the encrypted session key.

The security module can then use its copy of the domain key to decryptthe session key and use the decrypted session key to validate therequest. In this manner, any security module having access to the domainkey is able to validate the request and respond accordingly (e.g., byfulfilling or denying the request). Use of the session key to validatethe requests can be computationally less expensive than establishing thesecure channel over which the session key is provided to the operator bythe security module. Thus, an operator is able to perform a relativelycomputationally expensive negotiation to obtain a session key that iscomputationally easier to use to authenticate to multiple securitymodules.

FIG. 1 is an illustrative diagram 100 demonstrating various embodimentsof the present disclosure. In an embodiment, a cryptography service 102performs cryptographic operations which may include application of oneor more calculations in accordance with one or more cryptographicalgorithms. As illustrated in FIG. 1, the cryptography service enables auser or a service to generate plaintext 104 from ciphertext 106. In anexample configuration the cryptographic service can be used toencrypt/decrypt keys and these keys can be used to encrypt/decrypt data,such as data stored in a data storage service. For example, thecryptography service receives a request to generate plaintext fromciphertext encrypted under a key. The cryptography service determinesthat the requestor is an authorized entity; decrypts the key using amaster key and returns the now decrypted key to the service, which cangenerate plaintext from the ciphertext using the decrypted key. Inanother configuration, the cryptography service receives ciphertext andprocesses the received ciphertext into plaintext which is provided as aservice by the cryptography service. In this example, the ciphertext maybe provided to the cryptography service as part of an electronic requestto the cryptography service from an authorized entity, which may be acustomer of a computing resource service provider that operates thecryptography service and/or which may be another service of thecomputing resource service provider. The cryptography serviceillustrated in FIG. 1 may utilize one or more cryptographically strongalgorithms to encrypt data. Such cryptographically strong algorithms mayinclude, for example, Advanced Encryption Standard (AES), Blowfish, DataEncryption Standard (DES), Triple DES, Serpent or Twofish, and dependingon the specific implementation selected, may be either asymmetric orsymmetric key systems. Generally, the cryptography service may utilizeany encryption and/or decryption algorithm (cipher) or combination ofalgorithms that utilizes data managed by the cryptography service.

As will be discussed below in more detail, the cryptography service canbe implemented in a variety of ways. In an embodiment, the cryptographyservice is implemented by a computer system configured in accordancewith the description below. The computer system may itself comprise oneor more computer systems. For example, a cryptography service may beimplemented as a network of computer systems collectively configured toperform cryptographic operations in accordance with the variousembodiments. Or put another way, the computer system could be adistributed system. In an embodiment, ciphertext is information that hasbeen encrypted using a cryptographic algorithm. In the example of FIG.1, the ciphertext is the plaintext in an encrypted form. The plaintextmay be any information and while the name includes no word text,plaintext and ciphertext may be information encoded in any suitable formand does not necessarily include textual information but it may includetextual information. For example, as illustrated in FIG. 1, plan textand ciphertext comprise sequences of bits. Plaintext and ciphertext mayalso be represented in other ways and generally in any manner by whichencryption and decryption can be performed by a computer system.

FIG. 2 shows an illustrative example of an environment 200 in which acryptography service 202, such as illustrated in FIG. 1, may beimplemented. In the environment of 200, various components operatetogether in order to provide secure data related services. In thisparticular example, the environment 200 includes a cryptography service202, an authentication service 204, a data service frontend 206 and adata service backend storage system 208. In an embodiment, thecryptography service is configured in the environment 200 to performcryptographic operations, such as by receiving plaintext from a dataservice frontend and providing ciphertext in return or providingenvelope keys to services, so that the services can use the envelopekeys to perform encryption operations. The cryptography service mayperform additional functions, such as described below, such as securestorage of keys for performance of cryptographic operations, such asconverting plaintext into ciphertext and decrypting ciphertext intoplaintext. The cryptography service may also perform operations involvedin policy enforcement, such as by enforcing policy associated with keysstored therein. Example policies that may be enforced by a cryptographyservice are provided below. The data service frontend in an embodimentis a system configured to receive and respond to requests transmittedover a network 210 from various users 212. The requests may be requeststo perform operations in connection with data stored or to be stored inthe data service backend storage system 208. In the environment 200, theauthentication service, cryptography service, data service frontend anddata service backend storage system may be systems of a computingresource service provider that utilizes the systems to provide servicesto customers represented by the users illustrated in FIG. 2. The networkillustrated in FIG. 2 may be any suitable network or combination ofnetworks, including those discussed below.

The authentication service in an embodiment is a computer systemconfigured to perform operations involved in authentication of theusers. For instance, the data service frontend may provide informationfrom the users to the authentication service to receive information inreturn that indicates whether or not the user requests are authentic.Determining whether user requests are authentic may be performed in anysuitable manner and the manner in which authentication is performed mayvary among the various embodiments. For example, in some embodiments,users electronically sign messages transmitted to the data servicefrontend. Electronic signatures may be generated using secretinformation (e.g., a private key of a key pair associated with a user)that is available to both an authenticating entity (e.g., user) and theauthentication service. The request and signatures for the request maybe provided to the authentication service which may, using the secretinformation, compute a reference signature for comparison with thereceived signature to determine whether the request is authentic. If therequest is authentic, the authentication service may provide informationthat the data service frontend can use to prove to other services, suchas the cryptography service, that the request is authentic, therebyenabling the other services to operate accordingly. For example, theauthentication service may provide a token that another service cananalyze to verify the authenticity of the request. Electronic signaturesand/or tokens may have validity that is limited in various ways. Forexample, electronic signatures and/or tokens may be valid for certainamounts of time. In one example, electronic signatures and/or tokens aregenerated based at least in part on a function (e.g., a Hash-basedMessage Authentication Code) that takes as input a timestamp, which isincluded with the electronic signatures and/or tokens for verification.An entity verifying a submitted electronic signature and/or token maycheck that a received timestamp is sufficiently current (e.g., within apredetermined amount of time from a current time) and generate areference signature/token using for the received timestamp. If thetimestamp used to generate the submitted electronic signature/token isnot sufficiently current and/or the submitted signature/token andreference signature/token do not match, authentication may fail. In thismanner, if an electronic signature is compromised, it would only bevalid for a short amount of time, thereby limiting potential harm causedby the compromise. It should be noted that other ways of verifyingauthenticity are also considered as being within the scope of thepresent disclosure.

The data service backend storage system in an embodiment is a computersystem that stores data in accordance with requests received through thedata service frontend. As discussed in more detail below, the dataservice backend storage system may store data in encrypted form.

Data in the data service backend storage system may also be stored inunencrypted form. In some embodiments, an API implemented by the dataservice frontend allows requests to specify whether data to be stored inthe data service backend storage system should be encrypted. Data thatis encrypted and stored in the data service backend storage system maybe encrypted in various ways in accordance with the various embodiments.For example, in various embodiments, data is encrypted using keysaccessible to the cryptography service, but inaccessible to some or allother systems of the environment 200. Data may be encoded by thecryptography service for storage in the data service backend storagesystem and/or, in some embodiments, data may be encrypted by anothersystem, such as a user system or a system of the data service frontend,using a key that was decrypted by the cryptography service. Examples ofvarious ways by which the environment 200 may operate to encrypt dataare provided below.

Numerous variations of the environment 200 (and other environmentsdescribed herein) are considered as being within the scope of thepresent disclosure. For example, the environment 200 may includeadditional services that may communicate with the cryptography serviceand/or authentication service. For example, the environment 200 mayinclude additional data storage services (which may each comprise afrontend system and a backend system) which may store data in differentways. For instance, one data storage service may provide active accessto data where the data storage service performs data storage services ina synchronous manner (e.g., a request to retrieve data may receive asynchronous response with the retrieved data). Another data storageservice may provide archival data storage services. Such an archivaldata storage service may utilize asynchronous request processing. Forexample, a request to retrieve data may not receive a synchronousresponse that includes the retrieved data. Rather, the archival datastorage service may require a second request to be submitted to obtainthe retrieved data once the archival data storage service is ready toprovide the retrieved data. As another example, the environment 200 mayinclude a metering service which receives information from thecryptography service (and/or other services) and uses that informationto produce accounting records. The accounting records may be used tobill customers for usage of the cryptography service (and/or otherservices). Further, information from the cryptography service mayprovide an indication of how charges should be incurred. For instance,in some instances customers may be provided bills for use of thecryptography service. In other instances, charges for use of thecryptography service may be rolled into usage charges of other services,such as a data service that utilizes the cryptography service as part ofits operations. Usage may be metered and billed in various ways, such asper operation, per period of time, and/or in other ways. Other dataservices may also be included in the environment 200 (or otherenvironments described herein).

In addition, FIG. 2 depicts users interacting with the data servicefrontend. It should be understood that users may interact with the dataservice frontend through user devices (e.g., computers) which are notillustrated in the figure. Further, the users depicted in FIG. 2 (andelsewhere in the figures) may also represent non-human entities. Forexample, automated processes executing on computer systems may interactwith the data service frontend as described herein. As one illustrativeexample, an entity represented by a user in FIG. 2 may be a server that,as part of its operations, uses the data service frontend to storeand/or retrieve data to/from the data service backend storage system. Asyet another example, an entity represented by a user in FIG. 2 may be anentity provided as a service of a computing resource service providerthat operates one or more of the services in FIG. 2. For instance, auser in FIG. 2 may represent a virtual or other computer system of aprogram execution service offered by the computing resource serviceprovider. Other variations, including variations of other environmentsdescribed below, are also considered as being within the scope of thepresent disclosure.

For example, FIG. 3 shows an illustrative example of an environment 300in which various embodiments of the present disclosure may beimplemented. As with FIG. 2, the environment in FIG. 3 includes anauthentication service 302, a data service frontend 304 system (dataservice front end), a cryptography service 306 and a data servicebackend storage system 308. The authentication service, data servicefrontend, cryptography service and data service backend storage systemmay be configured such as described above in connection with FIG. 2. Forexample, users 310 may access the data service frontend through asuitable communications network, although such network is notillustrated in the figure. In the environment 300 illustrated in FIG. 3,arrows representing a flow of information are provided. In this example,a user transmits a PUT request to the data service frontend. The PUTrequest may be a request to store specified data in the data servicebackend storage system. In response to the PUT request, the data servicefrontend may determine whether the PUT request is authentic, that is ifthe user has submitted the request in the manner the requested operationcan be performed in accordance with authentication policy implemented bythe system.

In FIG. 3, an illustrative example of how such authentication decisionsmay be made is illustrated. In this particular example, the data servicefrontend submits an authentication request to the authenticationservice. The authentication service may use the authentication requestto determine if the PUT request from the user is authentic. If therequest is authentic, the authentication service may provideauthentication proof to the data service frontend. The authenticationproof may be an electronic token or other information that is usable byanother service, such as the cryptography service, to independentlydetermine that an authentic request was received. In one illustrativeexample, the PUT request is transmitted with a signature for the PUTrequest. The PUT request and its signature are provided through theauthentication service, which independently computes what a signatureshould be if authentic. If the signature generated by the authenticationservice matches that signature provided by the user, the authenticationservice may determine that the PUT request was authentic and may provideauthentication proof in response. Determining whether the PUT request isauthentic may also include one or more operations in connection with theenforcement of policy. For example, if the signature is valid but policyotherwise indicates that the PUT request should not be completed (e.g.,the request was submitted during a time disallowed by policy), theauthentication service may provide information indicating that therequest is not authentic. (It should be noted, however, that such policyenforcement may be performed by other components of the environment300.) The authentication service may generate the signature, such as byusing a key shared by the authentication service and the user. Theauthentication proof, as noted, may be information from which anotherservice, such as the cryptography service, can independently verify thata request is authentic. For example, using the example of thecryptography service illustrated in FIG. 3, the authentication proof maybe generated based at least in part on a key shared by both theauthentication service and the cryptography service, such as a key thatis inaccessible to other services.

As illustrated in FIG. 3, the data service frontend, upon receipt ofauthentication proof from the authentication service, provides plaintextand authentication proof to the cryptography service. The plaintext andauthentication proof may be provided according to an API call or otherelectronic request to the cryptography service (e.g., an Encrypt APIcall). The cryptography service may analyze the authentication proof todetermine whether to encrypt the plaintext.

It should be noted that additional information may be provided to thecryptography service. For example, an identifier of a key to be used toencrypt the plaintext may be provided as an input parameter to the APIcall from the data service frontend (which, in turn, may have receivedthe identifier from the user). However, it should be noted that anidentifier may not be transmitted to the cryptography service. Forinstance, in various embodiments, it may be otherwise determinable whichkey to use to encrypt the plaintext. For example, informationtransmitted from the data service frontend to the cryptography servicemay include information associated with the user, such as an identifierof the user and/or an organization associated with the user, such as anidentifier of a customer on behalf of which the user has submitted thePUT request. Such information may be used by the cryptography service todetermine a default key to be used. In other words, the key may beimplicitly specified by information that is usable to determine the key.Generally, determination of the key to be used may be performed in anysuitable manner. Further, in some embodiments, the cryptography servicemay generate or select a key and provide an identifier of the generatedor selected key to be used later. Another example API parameter can bean identifier for a master key for the customer account the encryptionoperation is being performed for.

As illustrated in FIG. 3, if the authentication proof is sufficient tothe cryptography service for the plaintext to be encrypted, thecryptography service can perform one or more cryptographic operations.In an embodiment, the one or more cryptographic operations can includean operation to generate an envelope key to be used to encrypt theplaintext. The envelope key can be a randomly generated symmetric key ora private key of a key pair. After the envelope key is generated, thecryptographic service can encrypt the envelope key with the master keyspecified in the API call and cause the encrypted envelope key to bepersistently stored (e.g., by storing the encrypted key in a storageservice or some other durable storage) or discarded. In addition, thecryptographic service can send a plaintext version of the envelope keyas well as and the encrypted envelope key to the data service frontend.The data service can then use the plaintext version of the envelope keyto encrypt the plaintext (i.e., the data associated with the encryptionrequest) and cause the envelope key to be stored in persistent storagein association with an identifier for the master key used to encrypt theenvelope key. In addition, the data service can discard the plaintextversion of the envelope key. As such, in an embodiment after the dataservice discards the plaintext version of the envelope key it will nolonger be able to decrypt the ciphertext.

In an alternative embodiment, the cryptographic operation can involveencrypting the plaintext. For example, the cryptographic serviceencrypts the plaintext and provides ciphertext to the data servicefrontend storage system. The data service frontend may then provide theciphertext to the data service backend storage system for persistentstorage in accordance with its operation. Other information may also betransmitted from the data service frontend to the data service backendstorage system. For example, an identifier of the key used to encryptthe plaintext to generate ciphertext may be provided with the ciphertextfor storage by the data service backend storage system. Otherinformation, such as metadata identifying the user and/or the user'sorganization, may also be provided.

As with all environments described herein, numerous variations areconsidered as being within the scope of the present disclosure. Forexample, the flow of information among the various components of theenvironment 300 may vary from that which is shown. For example,information flowing from one component to another component through anintermediate component (e.g. data from the authentication service to thecryptography service and/or data from the cryptography service to thedata service backend storage system) may be provided directly to itsdestination and/or through other intermediate components of theenvironment 300 (which are not necessarily included in the figure). Asanother example, PUT requests (and, below, GET requests) are providedfor the purpose of illustration. However, any suitable request forperforming the operations described may be used.

FIG. 4 shows an illustrative example of a process 400 which may be usedto store data in a data storage service in accordance with anembodiment. The process 400 may be performed, for example, by the dataservice frontend illustrated in FIG. 3. Some or all of the process 400(or any other processes described herein, or variations and/orcombinations thereof) may be performed under the control of one or morecomputer systems configured with executable instructions and may beimplemented as code (e.g., executable instructions, one or more computerprograms or one or more applications) executing collectively on one ormore processors, by hardware or combinations thereof. The code may bestored on a computer-readable storage medium, for example, in the formof a computer program comprising a plurality of instructions executableby one or more processors. The computer-readable storage medium may benon-transitory.

As illustrated in FIG. 4, the process 400 includes receiving 402 a PUTrequest. The PUT request may be electronically received over a networkand may include information associated with the request, such asinformation required for authentication, such as an electronic signatureof the PUT request. In response to having received the PUT request, theprocess 400 may include submitting 404 an authentication request. Forexample, the system performed in the process 400 may submit (e.g., viaan appropriately configured API call) an authentication request to aseparate authentication service, such as described above in connectionwith FIG. 3. Similarly, a data service frontend that performs its ownauthentication may submit the authentication request to anauthentication module implemented by the data service frontend.Generally, the authentication request may be submitted in any suitablemanner in accordance with the various embodiments.

Upon submission of the authentication request, an authenticationresponse is received 406 by the entity to which the authenticationrequest was submitted 404. For example, referring to FIG. 3, theauthentication service may provide a response to the data servicefrontend that includes proof of the authentication for use by otherservices. Other information, such as an indication of whether or notauthentication was successful, may also be transmitted. A determinationmay be made 408 whether the request is authentic. Authenticity of therequest may depend from one or more factors checked by an entity, suchas by an authentication service, or a combination of entities thatcollectively perform such checks. Authenticity may, for example, requirethat the request provide necessary valid credentials (e.g., anelectronic signature generated by a secret key shared by the checkingentity) and/or that policy allows the request to be fulfilled. From theperspective of a system that submits 404 an authentication request andreceives an authentication response, authenticity may depend from thereceived authentication response. Accordingly, in an embodiment, thedetermination 408 whether the request is authentic may be performedbased at least in part of the received authentication response. Forexample, if authentication was not authentic, the authenticationresponse so indicates and the determination 408 may be made accordingly.Similarly, the response may implicitly indicate that the authenticationrequest is authentic, such as by not including information that would beincluded if the request was authentic. If it is determined 408 that thePUT request is not authentic, then the PUT request may be denied 410.Denying the PUT request may be performed in any suitable manner and maydepend upon the various embodiments in which the process 400 is beingperformed. For example, denying 410, the PUT request may includetransmitting a message to a user that submitted the PUT request. Themessage may indicate that the request was denied. Denying the requestmay also include providing information about why the request was denied,such as an electronic signature not being correct or other reasons thatmay be used for determining how to resolve any issues that resulted inthe PUT request not being authentic or authorized.

If it is determined 408 that the PUT request is authentic andauthorized, then, in an embodiment, the process 400 includes performing412 one or more cryptographic operations that result in the plaintextbeing encrypted. For example, a request (e.g., an appropriatelyconfigured API call) may be submitted to a cryptography service toprovide a key to be used for performing the one or more cryptographicoperations. The request provided to the cryptography service may beprovided with proof of the PUT request being authentic so that thecryptography service can independently determine whether to perform thecryptographic operation (e.g., to encrypt the plaintext and provideciphertext or generate an envelope key that can be used to encrypt theplaintext). However, in various embodiments, authentication proof maynot be provided to the cryptography service and, for example, thecryptography service may operate in accordance with the request that itreceives. For example, if the cryptography service receives a requestfrom the data service frontend, the cryptography service may rely on thefact that the data service frontend has already independently verifiedauthentication of the request. In such an embodiment and otherembodiments, the data service frontend may authenticate itself with thecryptography service to provide an additional layer of security. Thecryptography service may generate or otherwise obtain a key, encrypt theobtained key or otherwise obtain the encrypted key (e.g., from memory),and provide the obtained key and the encrypted obtained key in responseto the request. The obtained key may be encrypted using a key identifiedin the request to the cryptography service. The obtained key may be usedto encrypt the plaintext and, after encrypting the plaintext, theobtained key may be discarded (e.g., irrevocably removed from memory).In alternate embodiment, a system performing the process 400 maygenerate or otherwise obtain the key used to perform the one or morecryptographic operations, provide the obtained key to the cryptographyservice to be encrypted.

In some embodiments, performing the one or more cryptographic operationsmay result in ciphertext being generated. Ciphertext generated as aresult of one or more cryptographic operations may be stored 414 forpossible retrieval at a later time. As noted above, storage of theciphertext may include storage of additional information that wouldenable the decryption of the ciphertext at later time. For instance, theciphertext may be stored with an identifier of a key used to encrypt theplaintext into the ciphertext so that the key having that identifier maylater be used to decrypt the ciphertext to obtain the plaintext. Storageof the ciphertext may also be performed in any suitable manner. Forexample, storage of the ciphertext may be performed by a data servicebackend storage system, such as described above.

FIG. 5, accordingly, shows an illustrative example of an environment 500and the flow of information illustrating how plaintext may be obtained.The environment 500 in this example includes an authentication service502, a cryptography service 504, a data service frontend 506 and a dataservice backend storage system 508. The authentication service,cryptography service, data service frontend and a data service backendstorage system may be systems such as described above. As illustrated inFIG. 5, the data service frontend is configured to receive a GET requestfrom a user 510 and provide plaintext in response. In order to do this,the data service frontend may also be configured to submitauthentication requests to an authentication service which itself may beconfigured to, if appropriate, provide to the data service frontendauthentication proof. The data service frontend may also be configuredto send a request to the cryptographic service to cause it to executeone or more cryptographic operations related to decrypting the data. Inan embodiment where envelope keys are used, the data service can submita request (e.g., an API call) to the cryptographic service that includesor specifies the encrypted envelope key (or an identifier for theencrypted envelope key) authentication proof, and an identifier of themaster key used to encrypt the envelope key to the cryptographicservice. The cryptographic service can determine whether theauthentication proof is sufficient to allow the operation and, if theauthentication proof is sufficient, decrypt the envelope key. Thedecrypted envelope key can be sent back to the data service, which canuse the key to decrypt the encrypted plaintext. The data service canthen discard the decrypted plaintext key.

In an alternative embodiment, the data service frontend may beconfigured to provide the received authentication proof to thecryptography service with ciphertext for the cryptography service todecrypt. The cryptography service may, accordingly, be configured todetermine whether the authentication proof is sufficient to allowdecryption of the ciphertext and, if the authentication proof issufficient, decrypt the ciphertext using an appropriate key (which maybe identified to the cryptography service by the data service frontend),and provide the decrypted ciphertext (plaintext) to the data servicefrontend. To provide ciphertext to the cryptography service, the dataservice frontend may be configured to obtain (e.g., via an appropriatelyconfigured API call) the ciphertext from the data service backendstorage system.

FIG. 6 shows an illustrative example of a process 600 which may be usedto obtain plaintext in accordance with various embodiments. The process600 may be performed, for example, by the data service frontend system(data service frontend) illustrated above in connection FIG. 5, althoughthe process 600 and variations thereof may be performed by any suitablesystem. In an embodiment, the process 600 includes receiving 602 a GETrequest (or other appropriate request) from a user. Receiving the GETrequest may be performed such as described above in connection withother types of requests. Upon receipt 602 of the GET request, anauthentication request may be submitted 604 to an authentication serviceor in any manner such as described above. An authentication responsemay, accordingly, be received. Based at least in part on the receiveauthentication response, a determination may be made 608 whether the GETrequest is authentic. If it is determined 608 that the GET request isnot authentic, the process 600 may include denying 610 the requestwhich, as described above, may be performed in various manners inaccordance with the various embodiments.

If it is determined 608 that the GET request is authentic, the process600 may include retrieving ciphertext from storage. Retrieving 612ciphertext from storage may be performed in any suitable manner. Forexample, referring to the environment 500 discussed above in connectionwith FIG. 5, the data service frontend may submit a request for theciphertext to the data service backend storage system and may receivethe ciphertext in response. Generally, ciphertext may be obtained fromstorage in any suitable manner. Upon receipt of the ciphertext, theprocess 600 may include performing 614 one or more operations relatingto decrypting the ciphertext. For example, in an embodiment, the datastorage service may send a request to the cryptographic service toperform one or more cryptographic operations relating to decrypting theciphertext 614. In one example configuration, the data service can sendthe cryptographic service an API call that includes the encryptedenvelope key (or an identifier for the encrypted envelope key)authentication proof, and an identifier of the master key used toencrypt the envelope key to the cryptographic service. The cryptographicservice can determine whether the authentication proof is sufficient toallow the operation and, if the authentication proof is sufficient,decrypt the envelope key. The decrypted envelope key can be sent back tothe data service, which can use the key to decrypt the encryptedplaintext.

In another configuration, the ciphertext may be provided to acryptography service such as the cryptography service described above inconnection with FIG. 5. Other information may also be provided to thecryptography service such as proof of authentication that can be used bythe cryptography service to determine whether or not to decrypt theciphertext. In addition, in some embodiments, an identifier of a key tobe used by the cryptography service to decrypt the ciphertext may beprovided to the cryptography service. However, in other embodiments, thekey may be implicitly indicated to the cryptography service. Forexample, the cryptography service may use a default key associated witha customer that is indicated to the cryptography service. Generally, anymanner by which the cryptography service can determine which key to useto decrypt the ciphertext may be used.

As illustrated in FIG. 6, after the ciphertext is decrypted, the process600 may include providing 616 a response to the GET request. Providing aresponse to the GET request may be performed in various ways inaccordance with the various embodiments. For example, providing theresponse to the GET request may include providing the plaintext. Inother embodiments, the plaintext may be a key that is used to decryptother encrypted information which is then provided in response to theGET request. Generally, depending on the role of the plaintext in aparticular embodiment of the disclosure, providing a response to the GETrequest may be performed in various ways.

As noted, various embodiments of the present disclosure allow for datato be stored by a data storage service in various ways. FIG. 7 shows anillustrative example of an environment 700 with arrows indicatinginformation flow in accordance with such embodiment. As illustrated inFIG. 7, environment 700 includes an authentication service 702, acryptography service 704, a data service frontend 706 and a data servicebackend storage system 708, such as described above. In this particularexample, the data service frontend is a computer system configured toreceive PUT requests from various users 710. PUT requests may include orspecify data objects to be stored by a data service backend storagesystem. PUT requests may also specify a key identifier for a key to beused to encrypt the data object. The data service frontend may also beconfigured to interact with an authentication service, such as describedabove, in order to provide authentication proof to a cryptographyservice that is operable to receive keys and key identifiers and providein response keys encrypted by the keys identified by the keyidentifiers. The data service frontend may then cause storage in a dataservice backend storage system. The data that may be stored may includea data object encrypted by the key. The data that may be stored may alsoinclude the key encrypted by the key identified by the key identifier.As discussed elsewhere, herein, the encrypted data object and encryptedkey may be stored in different services.

As illustrated in FIG. 7, the data service frontend is configured toprovide encrypted information to the data service backend storage systemfor storage. In this example, the data service frontend is configured toprovide a data object encrypted under a key and the key encrypted underanother key having a KeyID. It should be noted that, for the purpose ofillustration, curly bracket notation is used to denote encryption. Inparticular, information inside of curly brackets is the information thatis encrypted under a key specified in subscript. For example, {DataObject}_(Key) denotes that the data “Data Object” is encrypted under thekey “Key.” It should be noted that a key identifier may also appear insubscript using this curly bracket notation. When a key identifierappears in subscript, the information inside the curly brackets isencrypted under a key identified by the key identifier. For example,{Data Object}_(KeyID) denotes that the data object “Data Object” isencrypted under a key identified by the key identifier “KeyID.”Similarly, {Key}_(KeyID) denotes that the key “Key” is encrypted underthe key identified by the key identifier “KeyID.” In other words, thisdisclosure makes use of both keys and key identifiers in subscript andthe meaning of the subscript should be clear from context. Theciphertext may include additional metadata usable to determine theidentity of the associated decryption key.

FIG. 8 shows an illustrative example of a process 800 which may beperformed to store a data object in a data storage system, such as thedata service backend storage system described above in connection withFIG. 7. The process 800 may be performed by any suitable system, such asby the data service frontend system described above in connection withFIG. 7. In an embodiment, the process 800 includes receiving 802 a PUTrequest for a data object. Receiving the PUT request for the data objectmay be performed in any suitable manner, such as described above. Itshould be noted that the data object can be received in connection withthe request or may be received from another service. For example, therequest may include an identifier for a data object that may be obtainedfrom another service using the identifier. As with other processesdescribed above, the process 800 in an embodiment includes submitting804 an authentication request and receiving 806 an authenticationresponse. The authentication response that was received 806 may be usedto determine 808 whether the PUT request is an authentic request. If itis determined 808 that the PUT request is not authentic, the process 800may include denying 810 the request such as described above. If it isdetermined 808 that the PUT request is authentic, the process 800 mayinclude obtaining 812 a key identifier (KeyID), such as a keyID for amaster key used to encrypt envelope keys. Obtaining 812 the KeyID may beperformed in any suitable manner and the manner in which the KeyID isobtained may vary in accordance with the various embodiments. Forexample, as illustrated in FIG. 7, the PUT request may specify theKeyID. As another example, the identity of the user, or otherwiseassociated with the user, may be used to obtain an identifier or adefault key. As another example, the ciphertext may provide anindication of the associated key ID. As yet another example, one or morepolicy determinations may be used to determine which key identifier toobtain.

In an embodiment, the process 800 also includes generating 814 a key,such as an envelope key. Generating the key may be performed in anysuitable manner by, for example, the cryptographic service or theservice requesting encryption operations from the cryptographic service(e.g., a data storage service). For example, the key may be generatedusing a key derivation function using appropriate input to the keyderivation function. Example key derivation functions include KDF1,defined in IEEE Std 1363 2000, key derivation functions defined in ANSIX9.42, and HMAC-based key derivation functions, such as the HMAC-BasedExtract-and-Expand Key Derivation Function (HKDF) specified in RFC 5869.As another example, the key may be generated by a random or pseudorandom number generator, a hardware entropy source or a deterministicrandom bit generator such as is specified by National Institute ofStandards and Technology Special Publication (NIST SP) 800-90A. Itshould be noted that while FIG. 8 shows the process 800 includinggenerating 814 a key, the key may be obtained in other ways such as byretrieval from storage. In other words, the key may have beenpre-generated.

Continuing with the process 800 illustrated in FIG. 8, in an embodiment,the process 800 includes using 816 the generated key to encrypt a dataobject. For example, in an embodiment where the cryptographic servicegenerates the key, the cryptographic service can provide the key, theKeyID, and an encrypted copy of the key to the data service. Forexample, referring to FIG. 7, the data service frontend may receive theenvelope key and the KeyID for the master key used to encrypt theenvelope key from the cryptography service with any other relevantinformation, such as authentication proof. The plaintext copy of theencryption key may then be used to encrypt the data object. Theplaintext copy of the encryption key can be discarded and the encrypteddata object as well as the encrypted key may then be stored 818. Forexample, referring to FIG. 7, the data service frontend may transmit tothe encrypted data object and the encrypted key to the data servicebackend storage system for storage. In a configuration where the servicegenerates the key, the service can provide the key and the KeyID to thecryptography service. For example, the data service frontend may sendthe envelope key and the KeyID for the master key used to encrypt theenvelope key to the cryptography service with any other relevantinformation, such as authentication proof. The plaintext copy of theencryption key may then be used to encrypt the data object. The servicecan discard the plaintext copy of the encryption key and the encrypteddata object as well as the encrypted key may then be stored. Forexample, referring to FIG. 7, the data service frontend may transmit tothe encrypted data object and the encrypted key to the data servicebackend storage system for storage.

The encrypted data object and the encrypted envelope key may be storedwithout the plaintext version of key, that is, the plaintext key may beinaccessible to the data service backend storage system and one or moreother systems. The key under which the data object is encrypted (e.g.,the master key) may be made inaccessible in any suitable manner. In someembodiments this is achieved by storing it in memory accessible only tothe cryptographic service. In some other embodiments this can beachieved by storing the master key in a hardware or other securitymodule or otherwise under the protection of a hardware or other securitymodule. In some embodiments, the memory location storing the plaintextenvelope key (e.g., memory of the data service) may be allowed to beoverwritten or memory location storing the key may be intentionallyoverwritten to render inaccessible the key to the data service frontend.As another example, the plaintext envelope key may be maintained involatile memory that eventually ceases to store the key. In this manner,the envelope key is only accessible if it is decrypted using a keyidentified by the KeyID or otherwise obtained in an unauthorized manner,such as by cracking the key without the key identified by the KeyID,which may be computationally impractical. In other words, the keyidentified by the KeyID is required for authorized access to the keyunder which the data object is encrypted. Thus, if the data servicebackend storage system of FIG. 7 is compromised, such compromise wouldnot provide access to the unencrypted data object because decrypting thedata object would require access to the key, which is only obtainablethrough decryption using the key identified by the KeyID or throughother ways which are not computationally feasible.

As noted, various embodiments of the present disclosure allow users toboth store data objects and retrieve them in a secure manner. FIG. 9,accordingly, shows an illustrative example of an environment 900 whichmay be used to obtain data objects from storage. As illustrated in FIG.9, the environment 900 includes an authentication service 902, acryptography service 904, a data service frontend 906 system and a dataservice backend storage system 908. The authentication service,cryptography service, data service frontend and data service backendstorage system may be computer systems such as described above. Asillustrated in FIG. 9, the data service frontend system is configured toreceive data object requests and provide data objects in response. Inorder to provide the data objects in response, the data storage frontendsystem in this embodiment is configured to interact with theauthentication service, the cryptography service, and the data servicebackend storage system as illustrated in FIG. 9. For example, in variousembodiments, the data service frontend system is configured to submitauthentication requests to the authentication service and receivesauthentication proof in response to the requests. As another example,the data service frontend is configured to provide keys encrypted by akey identified by a KeyID and authentication proof to a cryptographyservice which is operable to determine whether to provide the key based,at least in part, on the authentication proof and, if determined toprovide the key, then provide the key to the data service frontend. Thedata service frontend may also be configured to provide otherinformation, such as the KeyID, to the cryptography service. Although,in some embodiments, the KeyID may be implicitly indicated to thecryptography service, such as through association with other informationprovided to the cryptography service. It should also be noted that, insome embodiments, the user 910 provides the KeyID to the data servicefrontend in connection with submitting requests to the data servicefrontend. Also, as illustrated in FIG. 9, the data service frontend inan embodiment is configured to request the data object from the dataservice backend storage system and receive in response the data objectencrypted by the key and the key encrypted by a key identified by theKeyID. In some embodiments the cryptographic service may be operable torefuse to perform decryption of a ciphertext not generated using a keyassociated with a specified KeyID.

The data service frontend, in an embodiment, is configured to use thekey received from the cryptography service to decrypt the data objectand provide the decrypted data object to the user. FIG. 10, accordingly,shows an illustrative example of a process 1000 which may be used toprovide the decrypted object in accordance with various embodiments. Theprocess 1000 may be performed by any suitable system such as the dataservice frontend system described in connection with FIG. 9. In anembodiment, the process 1000 includes receiving 1002 a GET request for adata object. Receiving the GET request for the data object may beperformed in any suitable manner such as described above in connectionwith other types of requests. For example, the GET request for the dataobject may include information used to authenticate the request and/orother information. The process 1000, accordingly, in an embodiment, aswith other processes described herein, includes submitting 1004 anauthentication request to an authentication system and receiving 1006 anauthentication response. Submitting the authentication request andreceiving the authentication response may be performed in any suitablemanner, such as described above. The authentication response may be usedto determine 1008 whether or not the GET request is authentic. If it isdetermined 1008 that the GET request is not authentic, the process 1000in an embodiment includes denying 1010 the request. If, however, it isdetermined 1008 that the GET request is authentic, the process 1000 inan embodiment includes retrieving 1012 the encrypted data object and anencrypted key from storage. For example, the data service frontendsystem may obtain the encrypted data object and encrypted key from thedata service backend storage system illustrated above in connection withFIG. 9.

In an embodiment, the process 1000 includes providing 1014 the encryptedenvelope key to a cryptography service. Providing 1014 the encryptedenvelope key to the cryptography service may be performed in anysuitable manner and may be provided with other information, such asauthentication proof that enables the cryptography service to determinewhether to decrypt the encrypted key. In addition, providing 1014 theencrypted envelope key to the cryptography service may include providingan identifier of a key required for authorized decryption of theencrypted envelope key to enable the cryptography service to select akey identified by the identifier from among multiple keys managed by thecryptography service. As noted above, however, keys may be implicitlyidentified. The cryptography service may, accordingly, select anappropriate key and decrypt the encrypted key. Accordingly, in anembodiment, the process 1000 includes receiving 1016 the decryptedenvelope key from the cryptography service. For example, if thecryptography service determines that the authentication proof is validand/or that decryption of the encrypted is allowable according to anyapplicable policies, the cryptography service may provide the decryptedkey to a system attempting to decrypt the data object. The data objectmay then be decrypted 1018 using the decrypted envelope key. Thedecrypted data object may then be provided 1020 to the requestor, suchas the user or other system that submitted the GET request.

In many instances, it is desirable for users (i.e., generally devicesutilizing a cryptography service) to interact directly with thecryptography service. FIG. 11 accordingly shows an illustrative exampleof an environment 1100 which allows for direct user 1102 access to acryptography service. In environment 1100, included is an authenticationservice 1104, a data service frontend 1106 and a data service backendstorage system 1108. The authentication service, data service frontendand data service backend storage system may be as described above. Forexample, the data service frontend may be configured to receive andrespond to requests from users as illustrated in FIG. 11 over a suitablenetwork 1110. As part of responding to requests from the users over thenetwork, the data service frontend may also be configured to interactwith the authentication service in order to determine whether userrequests are authentic and/or enforce policy on the requests. The dataservice frontend may also be configured to interact with the dataservice backend storage system as part of fulfilling user requests. Userrequests may include, for example, PUT requests to store data in thebackend storage system and

GET requests to retrieve data from the data service backend storagesystem. As above, other requests may also be used in accordance with thevarious embodiments, such as requests to delete data stored in the dataservice backend storage system, requests to update the data stored inthe data service backend storage system and the like.

In the particular example of FIG. 11, in the environment 1100, thecryptography service includes a cryptography service frontend 1112 and adata service backend 1114. As with the data service frontend, thecryptography service frontend is configured to receive and respond torequests from users over the network. The cryptography service frontendis also configured to interact with the authentication service todetermine whether user requests are authentic. Determining whether userrequests are authentic may be performed in a simple manner such asdescribed above. It should be noted that, while the cryptography servicefrontend and the data service frontend interact with the sameauthentication service, the cryptography service frontend and the dataservice frontend may interact with different authentication services.Further, the cryptography service frontend may be configured to enforcepolicy when responding to user requests.

The cryptography service frontend, in an embodiment, is configured tointeract with the cryptography service backend. The cryptography servicebackend is configured, in accordance with instructions received from thecryptography service frontend, to perform cryptographic operations.Cryptographic operations include encryption, decryption and hashcalculations and others. The environment 1100 may be used, for example,by users to have plaintext encrypted by the cryptography service so thatthe encrypted data can be stored in the data service backend storagesystem. Examples of such use of the environment 1100 are provided below.In addition, example details of an example cryptography service are alsoprovided below.

Data may be stored in the data service backend storage system in anysuitable manner such as described above. For example, techniques forstoring encrypted data in the backend storage system described above maybe used in the environment 1100. For example, while not illustrated, thedata service frontend may communicate with the cryptography servicefrontend to cause the cryptography service backend to encrypt data whichmay then be stored in the data service backend storage system. Theencrypted data may be a data object and/or an encrypted key that wasused to encrypt a data object. In the environment 1100, data may beplaced into the data service backend storage system in other ways aswell. For example, users may provide plaintext to be encrypted by thecryptography service and may receive ciphertext in response. The usersmay then interact or may submit a request to the data service frontendto request that the ciphertext be stored in the data service backendstorage system. The data service frontend, in this example, may storethe ciphertext in any manner. For instance, the data service frontendand backend storage systems may be configured to be indifferent towhether data is encrypted.

In addition, as with all environments illustrated herein, an additionalfrontend system may be logically located between the users and the dataservice frontend and the cryptography service frontend and possiblyother frontend systems in order to coordinate actions between thesystems. For example, in some embodiments, users may interact with afrontend system that itself interacts with the cryptography servicefrontend and data service frontend so that operations from theperspective of the user are simpler. For example, a user may requestthat a data object be encrypted and stored and a frontend systemresponds to the request by appropriate interactions with thecryptography service frontend and data service frontend. From theperspective of the user, however, such may be performed by a singlerequest. Other variations are also within the scope of the presentdisclosure.

FIG. 12 shows an illustrative example of an environment 1200 which maybe used to implement various embodiments of the present disclosure. InFIG. 12, the environment 1200 is configured to enable users to storeciphertext in a data service backend storage system 1202. As illustratedin FIG. 12, accordingly, the environment 1200 includes a data servicefrontend 1204, a data service backend storage system 1202, anauthentication service 1206, a cryptography service frontend 1208 and acryptography service backend 1210. The data service backend storagesystem, the data service frontend, the authentication service, thecryptography service frontend and the cryptography service backend maybe systems such as described above in connection with FIG. 11. Forexample, as illustrated in FIG. 12, the data service frontend isconfigured to receive and respond to user 1212 requests and may also beconfigured to enforce policy on user requests. The data servicefrontend, as part of responding to requests, may be configured to submitauthentication requests to the authentication service and receiveauthentication proof in response in response. Upon successfulauthentication, the data service frontend may be further configured tointeract with the data service backend storage system to obtainencrypted data objects and possibly unencrypted data objects from thedata service backend storage system, which may be then provided to auser.

As illustrated in FIG. 12, the cryptography service frontend is alsoconfigured to submit authentication requests to the authenticationservice and receive, in response, authentication proof. Authenticationproof may be used to obtain services from the cryptography servicebackend. For example, the cryptography service frontend may beconfigured to provide ciphertext to the cryptography service backendwith authentication proof and the cryptography service backend may beconfigured to decrypt the ciphertext and provide the ciphertext inreturn. As illustrated in FIG. 12, the ciphertext may be an encryptedkey and the cryptography service backend may decrypt the encrypted keyand provide the decrypted key, that is a plaintext key, to thecryptography service frontend, which is further configured to providethe plaintext key to the user. The user may then use the key to decryptthe encrypted data object received from the data service frontend or todecrypt encrypted data objects stored within the user's domain (e.g.,within a user operated or controlled data center or computer system). Inthis example, the user may have obtained the encrypted key from the dataservice frontend. For example, the user may have submitted a request tothe data service frontend for the data object and/or the key used toencrypt the data object. While illustrated in FIG. 11 as a singlerequest, the separate requests may be made for both the data object andthe key. As illustrated in FIG. 11, the data service frontend may obtainthe encrypted data object and encrypted key from the data servicebackend storage system and provide the encrypted data object andencrypted key to the user.

It should be noted that, as with all environments illustrated herein,variations are considered as being within the scope of the presentdisclosure. For example, FIG. 12 shows a data object encrypted under akey and the key encrypted by another key identified by a key identifierbeing provided to the user. Further levels of encryption may also beused. For example, the data object may be encrypted under a key that isonly accessible to the user (and/or that is not accessible by the othercomponents of the environment 1200). A key used to encrypt the dataobject may also be encrypted under the key that is only accessible tothe user. In this example, unauthorized access to the components of theenvironment 1200 (absent the user) still does not provide access to theunencrypted contents of the data object since access to the user's keyis still required for authorized decryption.

As another example, in the environment 1200 illustrated in FIG. 12, thedata service frontend and the data service backend storage system do nothave access to the plaintext data stored by the data service backendstorage system because the data service frontend and the data servicebackend storage system do not have access to a key needed to decrypt theencrypted data. In some embodiments, however, access may be granted tothe data service frontend and/or the data service backend storagesystem. For instance, in an embodiment, temporary access to the key maybe provided to the data service frontend to enable the data servicefrontend to obtain encrypted data, decrypt the encrypted data, use thedecrypted data for a particular purpose (e.g., indexing), and thendelete or otherwise lose access to the decrypted data. Such actions maybe governed by policy enforced by the data service frontend and/orcryptography service and may require authorization from the user.

FIG. 13 shows an illustrative example of a process 1300 which may beused to obtain an encrypted data object and an encrypted key such asfrom a data service backend storage system such as described above. Theprocess 1300, for example, may be performed by the data service frontendsystem described above in connection with FIG. 12. In an embodiment, theprocess 1300 includes receiving 1302 a GET request for an encrypted dataobject. Receiving the GET request may be performed in any suitablemanner such as by receiving the request via an API call to the dataservice frontend system. As a result of having received the GET request,process 1300 may include submitting 1304 an authentication request andreceiving 1306 an authentication response. Submitting 1304 theauthentication request and receiving 1306 the authentication responsemay be performed in any suitable manner such as described above. Theauthentication response may be used to determine 1308 whether the GETrequest is authentic. If it is determined 1308 that the GET request isnot authentic, the process 1300 may include denying 1310 the GETrequest. Denying 1310 the GET request may be performed in any suitablemanner such as described above. If, however, it is determined 1308 thatthat GET request is authentic, the process 1300 may include providing1312 the encrypted data object with an encrypted key that, whendecrypted, is usable to decrypt the encrypted data object. It should benoted that, as with all processes described herein, numerous variationsare considered as being within the scope of the present disclosure. Forexample, the process 1300 may be configured to respond to the GETrequest, when authentic, by providing the encrypted data object butwithout providing an encrypted key. A requester, that is a user orsystem that submitted the GET request, may obtain the encrypted key inother ways. For example, in some embodiments, users may store encryptedkeys themselves in a data storage system under the user's control. Asanother example, one storage service may store the encrypted data objectand another service may store the encrypted key and the user may obtainthe encrypted data object and encrypted key from the respectiveservices. As another example, another service or a third party to theuser may be used to store encrypted keys and users may obtain encryptedkeys upon request. Generally, any way by which encrypted keys may beprovided may be used.

As illustrated in FIG. 13, the process 1300 may result in an entityhaving been provided a data object and an encrypted key usable todecrypt the data object. In various embodiments, the encrypted key mustbe decrypted in order to decrypt the data object. FIG. 14, accordingly,shows an illustrative example of a process 1400 which may be used toprovide a decrypted key to an entity in need of such a decrypted key inorder to use the decrypted key for decryption of an encrypted dataobject. The process 1400 may be performed by any suitable system such asby the cryptography service frontend system described above inconnection with FIG. 12. In an embodiment, the process 1400 includesreceiving 1402 a decryption to decrypt a key using another key having aspecified KeyID. While the process 1400 is described in connection withdecryption of a key, it should be noted that the process 1400 may beadapted for decryption of data in general. The decryption request may bereceived 1402 in any suitable manner such as described above (e.g., viaan appropriately configured API call). Further, the decryption requestmay be received by any entity appropriate to the context in which theprocess 1400 is being performed. For instance, the decryption requestmay originate from the user or from another system, such as the dataservice frontend discussed above. The decryption request may alsoinclude data (e.g., a key) to be decrypted or a reference thereto. TheKeyID may be specified also in any suitable manner. For example, in someembodiments, the decryption request includes the KeyID or a reference tothe KeyID, that is, information that can be used to determine the KeyID.As discussed above, the KeyID may also be implicitly specified. Forexample, the KeyID may be obtained through association with availabledata such as an identity of a requester that submitted the decryptionrequest. For instance, the key corresponding to the KeyID may be adefault key for the requestor or for the entity on behalf of which therequest was submitted.

The process 1400, in an embodiment, includes submitting 1404 anauthentication request and receiving 1406 an authentication response.Submitting 1404 the authentication request and receiving 1406 theauthentication response may be performed in any suitable manner such asdescribed above. Further, as described above, the receivedauthentication response may be used to determine 1408 whether the GETrequest is authentic. If it is determined 1408 that the GET request isnot authentic, the process 1400 may include denying 1410 the GETrequest. Denying 1410 the GET request may be performed in any suitablemanner such as is described above. If, however, it is determined 1408that the GET request is authentic, the process 1400 may includeaccessing policy information for the specified KeyID and/or for therequester. Policy information may include information including one ormore policies on the KeyID and/or the requester.

In an embodiment, the accessed policy information is used to determine1414 whether any applicable policy allows decryption of the key havingthe specified KeyID. If it is determined 1414 that the policy does notallow decryption of the key specified by the KeyID, the process 1400 mayinclude denying 1410 the GET request such as described above. If,however, it is determined 1414 that policy allows decryption of the keyhaving the specified KeyID, the process 1400 may include decrypting 1416the key using the key identified by the KeyID. Once the key has beendecrypted, using a key having the KeyID, the decrypted key may then beprovided 1418 such as by transmission over a network to the requesterthat submitted the decryption request (or, in some embodiments, anotherauthorized destination).

As illustrated in the environment 1200 discussed above, a user mayobtain encrypted data objects and keys for decrypting the data objectsin various ways. FIG. 15 shows an illustrative example of a process 1500which may be used to obtain plaintext in accordance with variousembodiments. The process 1500 may be performed by any suitable systemsuch as by a system being operated and/or hosted by a user such asdescribed in connection with FIG. 12. Other suitable systems includesystems operating on behalf of users and not necessarily according toreal time user input provided but perhaps according to preprogrammedprocesses.

In an embodiment, the process 1500 includes requesting 1502 ciphertextfrom a data storage service. Requesting 1502 ciphertext from a datastorage service may be performed in any suitable manner such asdescribed above. For example, a system performing the process 1500 mayrequest 1502 ciphertext, using an appropriately configured API call inthe environment 1200 illustrated above in connection with FIG. 12 and/orby the process 1300 described above in connection with FIG. 13.

The process 1500 may also include receiving 1504 ciphertext and anencrypted key. Receiving ciphertext and encrypted key may be performedin any suitable manner. For example, the ciphertext and encrypted keymay be received in a response to the request for the ciphertext from adata storage service. Generally, however, the ciphertext and encryptedkey may be received 1504 in other suitable ways. For example, therequest to receive ciphertext from the data storage service may be anasynchronous request and ciphertext may be received 1504 pursuant toanother request that is subsequently submitted. Further, the ciphertextand encrypted key may be provided in a single response or may beobtained separately such as by different responses (which may be fromthe same or from different systems). As another example, a systemperforming a process 1500 may locally or otherwise store encrypted keysand the encrypted key may be received from local memory.

In an embodiment, the process 1500 includes requesting decryption of theencrypted key, using a key having a specified KeyID. The KeyID may bespecified in any suitable manner such as described above. Further, itshould be noted that the system performing the process 1500 may be ableto specify the KeyID in any suitable manner. For example, the encryptedkey and/or information provided therewith may specify the KeyID. Asanother example, the system performing the process 1500 may have localor remote access to information that enables determining the KeyID. Alocal or remote database, for instance, may associate data objectidentifiers with key identifiers for keys used to encrypt the dataobjects. Generally, any manner in which the system can be enabled tospecify the KeyID may be used. Further, in some embodiments, the KeyIDneed not be specified, such as when information provided to acryptography service is sufficient to determine the KeyID. The request1506 for decryption of the encrypted key may be performed in anysuitable manner such as in connection with an environment discussedabove in connection with FIG. 12 and/or by performance of the process1400 described above in connection with FIG. 14.

The process 1500, in an embodiment, includes receiving 1508 thedecrypted key. Receiving 1508 the decrypted key may be performed in anysuitable manner. For example, the decrypted key may be received inresponse to a request for decryption of the encrypted key. As anotherexample, the request for decryption of the encrypted key may be anasynchronous request and another request may have been submitted forreceiving the decrypted key.

Generally, the decrypted key may be received in any suitable manner.Further, as with all information flowing from one device to another, thepassage of information may be performed using secure channels. Forinstance, the decrypted key may be once again encrypted for decryptionby an entity receiving the decrypted key. Generally, any manner ofsecure communication may be used to pass information from one entity toanother.

Once the decrypted key has been received 1508, the process 1500 mayinclude using 1510 the decrypted key to decrypt 1510 ciphertext andtherefore obtain plaintext. It should be noted that, as with allprocesses described herein, variations are considered as being withinthe scope of the present disclosure. For example, the process 1500 showsa request for ciphertext and a request for decryption of an encryptedkey being performed sequentially. However, as with many operationsdescribed herein in connection with the various processes, operationsneed not be performed sequentially in various embodiments. For example,if a system performing the process 1500 has access to the encrypted keyprior to requesting the ciphertext, or is otherwise able to do so, thesystem may request ciphertext and request decryption of the encryptedkey in parallel or in an order different from that which is illustrated.Other variations are also considered as being within the scope of thepresent disclosure.

As discussed above, various embodiments of the present disclosure aredirected to providing cryptography services. Cryptography services maybe provided by a cryptography service system such as described above.FIG. 16 accordingly shows an illustrative example of a cryptographyservice 1600 in accordance with various embodiments. As illustrated inFIG. 16 and as discussed above, the cryptography service 1600 islogically comprised of a frontend system and a backend system. Both thefrontend system and the backend system may be implemented by one or morecomputer systems configured to perform operations described herein. Forexample, as illustrated in FIG. 16, the frontend system of thecryptography service 1600 implements a request API and a policyconfiguration API. The request API, in an embodiment, is an APIconfigured for requesting cryptographic and other operations to beperformed by the cryptography service. Thus, requests may be made to thefrontend system via the request API in order for such cryptographicoperations to be performed by the cryptography service.

The request API may be configured with the following example,high-level, requests available:

CreateKey(KeyID)

Encrypt(KeyID, Data, [AAD])

Decrypt(KeyID, Ciphertext, [AAD])

Shred(KeyID)

ReKey(Ciphertext, OldKeyID, NewKeyID).

A CreateKey(KeyID) request, in an embodiment, causes the cryptographyservice to create a key identified by the KeyID identified in therequest. Upon receipt of a request, the cryptography service maygenerate a key and associate the key with the KeyID. It should be knownthat KeyID's may be, but are not necessarily unique identifiers. Forinstance, a KeyID may identify a family of keys. For example, in someembodiments, key rotation is performed. Key rotation may involvereplacing keys with other keys to prevent collection of enough decrypteddata to allow practical cracking of a cipher used. If performed at thedirection of an entity different from the cryptography service, use ofthe CreateKey(KeyID) request may cause the cryptography service tocreate a new key to replace an old key identified by the KeyID. The oldkey may remain identified by the KeyID, but may, for instance, be onlyused for decryption (of data that has already been encrypted using theold key) and not for future encryption. As another example, in someembodiments, users of the cryptography service provide their own keyidentifiers and there is a possibility that two different customers mayprovide the same identifier. In such instances, the identifier may notuniquely identify a key or even uniquely identify a family of keys.Various measures may be in place to address this. For example, anidentity or other information associated with a user of the cryptographyservice may be used to identify the proper key or family of keys. Instill other embodiments the cryptographic service may assign a KeyIDrandomly, sequentially, or using any other method.

It should be noted that, when a KeyID does not uniquely identify a key,various systems may be in place to enable proper functionality. Forexample, in various embodiments, a family of keys identified by a KeyIDis finite. If a decryption operation using a key identified by a KeyIDis requested, additional data (e.g., a time stamp of when the encryptionwas performed) may enable determining the proper key to use. In someembodiments, ciphertexts may include information indicating a keyversion. In some embodiments, all possible keys are used to providedifferent decryptions of the data. Since there are a finite number ofkeys, the proper decryption may be selected from those provided. In someembodiments, decryption with a key is performed in a manner that enablesthe cryptographic service to detect that the ciphertext was notgenerated based at least in part on the key, such as by usingauthenticated encryption. Other variations are also considered as beingwithin the scope of the present disclosure.

An Encrypt(KeyID, Data, [AAD]) request may be used to cause thecryptography service to encrypt the specified data using a keyidentified by the KeyID. Additional Authenticated Data (AAD) may be usedfor various purposes and may be data that is not necessarily encrypted,but that is authenticated, e.g., by an electronic signature, a messageauthentication code or, generally, a keyed hash value included with theAAD. In some embodiments, the ciphertext is generated including at leasta portion of the AAD. In some other embodiments the AAD is providedseparately during decryption. In some other embodiments, the AAD isgenerated at decryption time based at least in part on the request andor other metadata such that decryption will only succeed when themetadata passes. In some embodiments, policy may constrain whether acryptographic operation can be performed with respect to particular AAD.Processing of Encrypt(KeyID, Data, [AAD]) requests may require, byprogramming logic and/or policy enforced by the cryptography service,both that the AAD contain particular values and that the AAD beauthentic (e.g., not modified since original transmission). Similarly, aDecrypt(KeyID, Ciphertext, [AAD]) request may be used to cause thecryptography service to decrypt the specified ciphertext using a keyidentified by the KeyID. The AAD in the Decrypt(KeyID, Ciphertext,[AAD]) request may be used such as described above. For instance,processing of the Decrypt(KeyID, Ciphertext, [AAD]) may require, byprogramming logic and/or policy enforced by the cryptography service,both that the AAD contain particular values and that the AAD beauthentic (e.g., not modified since original transmission).

The Shred(KeyID), in an embodiment, may be used to cause thecryptography service to electronically shred a key or family of keysidentified by the specified KeyID. Electronic shredding may includemaking the key no longer accessible. For example, use of theShred(KeyID) request may cause the cryptography system to command one ormore hardware devices to perform a SecureErase operation on one or morekeys identified by the specified KeyID. Generally, the key(s) identifiedby the KeyID may be electronically shredded in any suitable manner, suchas by overwriting data encoding the key with other data (e.g., a seriesof zeros or ones or a random string). If the key(s) are stored encryptedunder a key, the key used to encrypt the keys may be electronicallyshredded, thereby causing a loss of access to the key(s). In someembodiments, the shred operation may cause decrypt operations indicatingthe shredded KeyID to fail at some determined point in the future. Othermanners of securely and permanently destroying any possible access tothe key(s) may be used.

The ReKey(Ciphertext, OldKeyID, NewKeyID) request, in an embodiment, maybe used to cause the cryptography service to encrypt ciphertext under adifferent key. When the cryptography service receives aReKey(Ciphertext, OldKeyID, NewKeyID) request, it may use a keyidentified by the OldKeyID to decrypt the specified ciphertext and thenuse a key identified by the NewKeyID to encrypt the decryptedciphertext. If a key identified by the NewKeyID does not yet exist, thecryptography service may generate a key to use and associate thegenerated key with the specified NewKeyID, such as described inconnection the Create(KeyID) request described above. In someembodiments, the ReKey operation may be operable to cause data to betransferrable between isolated instances of a cryptography service. Insome embodiments, a policy might permit a rekey operation to beperformed on a ciphertext but might not permit the same requestor todirectly decrypt the ciphertext. In some embodiments, ReKey mightsupport rekeying a ciphertext from a key identified by a first KeyIDwithin a first account to a key identified by a KeyID within a secondaccount.

Similarly, the frontend system may implement a policy configuration APIwhich, in an embodiment, enables users to submit requests forconfiguring policies for the performance of cryptographic operations andfor other policy-related operations. Policies may be associated withkeys, groups of keys, accounts, users and other logical entities invarious embodiments. Example policies, which may be configured via thepolicy configuration API, are provided below. In an embodiment, thecryptography service policy configuration API includes the followingrequests:

SetKeyPolicy(KeyID, Policy)

Suspend(KeyID, Public Key)

Reinstate(KeyID, Private Key).

In an embodiment, the SetKeyPolicy(KeyID, Policy) request may be used tocause the cryptography service to store a policy on the key (or familyof keys) identified by the KeyID. A policy may be information that isdeterminative of whether a requested cryptographic operation can beperformed in a particular context. The policy may be encoded in adeclarative access control policy language, such as eXtensinble AccessControl Markup Language (XACML), Enterprise Privacy AuthorizationLanguage (EPAL), Amazon Web Services Access Policy Language, MicrosoftSecPol or any suitable way of encoding one or more conditions that mustbe satisfied for a cryptographic operation to be performed. Policies maydefine what operations can be performed, when the operations can beperformed, which entities can make authorized requests for operations tobe performed, which information is required for a particular request tobe authorized, and the like. In addition, policies may be defined and/orenforced using access control lists, privileges associated with users,and/or operation bitmasks in addition to or instead of the examplesgiven above. Example policies appear below.

In some embodiments the cryptographic service may support a suspendoperation, e.g., using a Suspend(KeyID, Public Key) API call. A suspendoperation enables the customer of the cryptographic service to deny theoperator of the cryptographic service use of or access to a key. Thiscan be useful to customers concerned about covert lawful orders or othercircumstances in which the operator of the cryptographic service mightbe compelled to perform some operation using a key. It may also beuseful to customers that wish to lock particular data and render itinaccessible online. In some embodiments, a suspend operation mightinclude receiving a public key from a customer and encrypting the keyspecified by a given KeyID with the received public key and shreddingthe key specified by the KeyID, such that the provider is not able toaccess the suspended key unless the private key associated with thepublic key is provided, e.g., using a Reinstate(KeyID, Private Key) APICall that both specifies the KeyID and includes the private key. In someother embodiments, a suspend operation might involve encrypting a keyassociated with a specified KeyID using another key managed by thecryptographic service, including without limitation one created for thepurpose of the instant suspend operation. The ciphertext produced bythis operation can be provided to the customer and not retained withinthe cryptographic service. The original key identified by the KeyID canthen be shredded. The cryptographic service may be operable to receivethe provided ciphertext and re-import the suspended key. In someembodiments the ciphertext may be generated in a manner that willprevent the cryptographic service from returning a decrypted version tothe customer.

As illustrated in FIG. 16, the cryptography service 1600 includes abackend system 1602 that itself comprises various components in someembodiments. For example, the backend system in this example includes arequest processing system (unit) 1604 which may be a subsystem of thecryptography service 1600 that is configured to perform operations inaccordance with requests received through either the request API 1606 orthe policy configuration API 1608. For example, the request processingcomponent may receive requests received via the request API and thepolicy configuration API determines whether such requests are authenticand are therefore fulfillable and may fulfill the requests. Fulfillingthe request may include, for example, performing and/or having performedcryptographic operations. The request processing unit may be configuredto interact with an authentication interface 1610 which enables therequest processing unit to determine whether requests are authentic. Theauthentication interface may be configured to interact with anauthentication system such as described above. For example, when arequest is received by the request processing unit, the requestprocessing unit may utilize the authentication interface to interactwith an authentication service which may, if applicable, provideauthentication proof that may be used in order to cause a performance ofcryptographic operations.

The backend system of the cryptography service 1600 also, in thisillustrative example, includes a plurality of a security modules 1612(cryptography modules), a policy enforcement module 1614, and acoordinator module 1616. An example of the coordinator module 1616 isthe security module coordinator 1704 discussed below in connection withFIG. 17. Returning to FIG. 16, one or more of the security modules maybe hardware security modules although, in various embodiments, asecurity module may be any suitable computer device configured accordingto have capabilities described herein. Each security module in anembodiment stores a plurality of keys associated with KeyIDs. Eachsecurity module may be configured to securely store the keys so as tonot be accessible by other components of the cryptography service 1600and/or other components of other systems. In an embodiment, some or allof the security modules are compliant with at least one securitystandard. For example, in some embodiments, the security modules areeach validated as compliant with a Federal Information ProcessingStandard (FIPS) outlined in FIPS Publication 140-1 and/or 140-2, such asone or more security levels outlined in FIPS Publication 140-2. Inaddition, in some embodiments, each security module is certified underthe Cryptographic Module Validation Program (CMVP). A security modulemay be implemented as a hardware security module (HSM) or anothersecurity module having some or all capabilities of an HSM. In someembodiments, a validated module is used to bootstrap operations. In someembodiments, customers can configure some keys that are stored in andoperated on only by validated modules and other keys that are operatedon by software. In some embodiments, the performance or cost associatedwith these various options may differ.

The security modules may be configured to perform cryptographicoperations in accordance with instructions provided by the requestprocessing unit. For example, the request processing unit may provideciphertext and a KeyID to an appropriate security module withinstructions to the security module to use a key associated with theKeyID to decrypt the ciphertext and provide in response the plaintext.In an embodiment, the backend system of the cryptography service 1600securely stores a plurality of keys forming a key space. Each of thesecurity modules may store all keys in the key space; however,variations are considered as being within the scope of the presentdisclosure. For example, each of the security modules may store asubspace of the key space. Subspaces of the key space stored by securitymodules may overlap so that the keys are redundantly stored throughoutthe security modules. In some embodiments, certain keys may be storedonly in specified geographic regions. In some embodiments, certain keysmay be accessible only to operators having a particular certification orclearance level. In some embodiments certain keys may be stored in andused only with a module operated by a particular third party providerunder contract with the provider of data storage services. In someembodiments, constructive control of security modules may require thatlawful orders seeking to compel use of keys other than as authorized bythe customer to involve either additional entities being compelled oradditional jurisdictions compelling action. In some embodiments,customers may be offered independent options for the jurisdiction inwhich their ciphertexts are stored and their keys are stored. In someembodiments, security modules storing keys may be configured to provideaudit information to the owner of the keys, and the security modules maybe configured such that the generation and providing of auditinformation not suppressible by the customer. In some embodiments, thesecurity modules may be configured to independently validate a signaturegenerated by the customer such that the provider (e.g., hosting thesecurity modules) is not able to perform operations under keys stored bythe security modules. In addition, some security models may store all ofthe key space and some security modules may store subspaces of the keyspace. Other variations are also considered as being the scope of thepresent disclosure. In instances where different security modules storedifferent subspaces of the key space, the request processing unit may beconfigured such as with a relational table or other mechanism todetermine which security module to instruct to perform cryptographicoperations in accordance with various requests.

In an embodiment, the policy enforcement module is configured to obtaininformation from a request processing unit and determine, based at leastin part on that information, whether the request received through theAPI may be performed. For example, when a request to performcryptographic operation is received through the request API, the requestprocessing unit may interact with the policy enforcement module todetermine whether fulfillment of the request is authorized according toany applicable policy such as policy applicable to a specified KeyID inthe request and/or other policies such as policy associated with therequestor. If the policy enforcement module allows fulfillment of therequest, the request processing unit may, accordingly, instruct anappropriate security module to perform cryptographic operations inaccordance with fulfilling the request.

As with all figures described herein, numerous variations are consideredas being within the scope of the present disclosure. For example, FIG.16 shows the policy enforcement module separate from security modules.However, each security module may include a policy enforcement module inaddition to or instead of the policy enforcement module illustrated asseparate. Thus, each security module may be independently configured toenforce policy. In addition, as another example, each security modulemay include a policy enforcement module which enforces policiesdifferent from policies enforced by a separate policy enforcementmodule. Numerous other variations are considered as being within thescope of the present disclosure.

FIG. 17 shows an illustrative example of an environment 1700 in whichvarious embodiments may be practiced. The environment 1700 illustratedin FIG. 17 may be a component of any of the environments describedabove. As illustrated in FIG. 17, the environment 1700 includes aplurality of security modules 1702, where each of the security modules1702 may be a security module such as described above. Each of thesecurity modules 1702 may, for instance, store or otherwise have accessto the same cryptographic key or the same set of cryptographic keys,which may include multiple cryptographic keys. In other words, multiplesecurity modules 1702 may have access to the same cryptographic key(s)and, generally, may operate under the same operational parameters.Accordingly, as discussed above, the security modules 1702 areconfigured to upon request perform cryptographic operations utilizingthe cryptographic keys to which the security modules 1702 have access.

As illustrated in FIG. 17, the environment 1700 also includes a securitymodule coordinator 1704. The security module coordinator 1704 may be asystem configured to coordinate the states of the security modules in acryptographic domain where a cryptographic domain (referred to simply asa domain) may comprise a set of security modules all having access tothe same set of cryptographic keys. The security module coordinator 1704may, for instance, coordinate the states of the security modules 1702 byensuring that each of the security modules 1702 operate under the sameoperational parameters, such as by using the same cryptographic keys.For the purpose of illustration, the security modules 1702 are allmembers of the same cryptographic domain, although in variousembodiments various environments may utilize multiple security moduleswhere some security modules are not members of one or more cryptographicdomains of which other security modules are members. Further, securitymodules of the same cryptographic domain are not necessarily all membersof other cryptographic domains. One cryptographic module that is amember of the same cryptographic domain as another security module may,for instance, be a member of another cryptographic domain of which theother security module is not a member.

As described in more detail below, the security module coordinator maysynchronize the states of the security modules 1702 so that the securitymodules 1702 all operate in accordance with the same operationalparameters. For example, the security module coordinator may ensure thateach of the security modules 1702 operate using the same cryptographickeys, the same operator quorum rules, operator permissions and/or withother operational parameters such as those described below. In anembodiment, the security module coordinator 1704 is configured to accessa domain token repository 1706. The domain token repository 1706 may bea system having data storage configured to store domain tokens, such asdescribed in more detail below. The domain token repository 1706 mayinclude various metadata about the domain tokens, such as dataindicating which operator submitted the domain token, whether the domaintoken was accepted for installation, which security modules haveinstalled the domain token (i.e., which security modules have updatedtheir operational parameters in accordance with information encoded inthe domain token) and/or other information.

The security module coordinator 1704 may also be configured to access anencrypted key repository 1708. The encrypted key repository 1708 may bea data storage system that stores encrypted customer keys, that is, keysof customers of a cryptography service that utilizes the environment1700. The keys in the encrypted key repository may be encrypted under akey securely stored among the security modules 1702, which may bereferred to as a domain key. In an embodiment, keys stored in theencrypted key repository 1708 may be encrypted in key tokens, which maybe organized collections of data that include a customer key encryptedunder a domain key and an identifier of the domain key (and possiblyadditional information that may be encrypted or plaintext). As discussedbelow, to perform cryptographic operations using a customer key, thecustomer key may be provided to a security module which may, in turn,use the domain key to decrypt the customer key and use the customer keyto perform one or more cryptographic operations, such as encryption ordecryption of data provided to the security module with the encryptedcustomer key. The encrypted key repository 1708 may be configured tostore customer keys in an organized manner. For instance, the encryptedkey repository may store each customer key in association with anidentifier of a domain key under which the customer key is encrypted. Inthis manner, if the domain key changes (e.g., is rotated as part of akey rotation process), customer keys encrypted under the domain key arelocatable (e.g., by submitting a query to the encrypted key repository18708) so that the customer keys can be decrypted using the domain keyand reencrypted under a new domain key.

As illustrated in FIG. 17, the environment 1700 includes one or moresecurity module operators 1710. A security module operator 1710 may be ahuman operator having authorization to perform various actions in theenvironment 1700, such as described in more detail below. It should benoted that while security module operator 1710 in an embodiment is ahuman operator, the security module operator may interact with variouscomponents of the environment 1700 through appropriate hardware such asinput devices, computer systems and the like, although such hardware isnot illustrated in the figure. It should further be noted that while invarious embodiments the security module operator 1710 is a humanoperator, various embodiments of the present disclosure may utilizenon-human operators, such as computer systems operating in accordancewith automated processes. As an illustrative example, variousembodiments of the present disclosure may utilize non-human operators,such as the security module coordinator 1704, that are configured toperform various automated tasks, such as cryptographic key rotation.

As illustrated by the various arrows in FIG. 17, the environment 1700 isconfigured to enable synchronization of the security modules 1702 sothat the security modules 1702 operate in accordance with consistentoperational parameters. In an embodiment of the security module operator1710 submits a domain change request to one of the security modules1702. The domain change request may be a request that specifies a changeto a domain that the security module operator 1710 desires to make. Asan example, the security module operator may desire to change one ormore cryptographic keys in the cryptographic domain, one or more quorumrules for performing operations requested by operators, one or moreoperator permissions and/or other operational parameters in which thesecurity modules 1702 operate. Further, in various embodiments, thesecurity modules 1702 are configured such that the security moduleoperator 1710 is able to submit a domain change request to any of thesecurity modules 1702, and all of the security modules 1702 are operableto process the request. As illustrated in FIG. 17, the security module1702 may respond to the domain change request by providing the securitymodule operator 1710 a domain token. The security modules 1702 may eachbe configured to enforce one or more conditions before providing adomain token in response to a request to change a domain. In someexamples, each security module 1702 may be configured to determinewhether a request to change a domain includes an electronic (digital)signature for each security module operator of a set of security moduleoperators that satisfy domain quorum rules of a domain currentlyinstalled on the security module 1702. For instance, if the quorum rulesrequire K (K a positive integer) of the security module operators 1710,the security module may check that the domain change request includes anelectronic signature for K operators listed in a currently installeddomain.

As described in more detail below, a domain token may be a collection ofinformation that encodes the operational parameters with which thesecurity modules operator desires that the security modules 1702operate. It should be noted that, as discussed in more detail below, thesecurity module that provides the domain token, in various embodiments,does not operate in accordance with the proposed operational parametersencoded in the token until a later time, such as when instructed tooperate in accordance with the parameters by the security modulecoordinator 1704. In other words, a domain token is an example of aproposal for a set of operational parameters for the security modules1702 of the cryptographic domain defined in the token. Thus, the tokenis an example of information encoding a proposed state for a set ofsecurity modules. As discussed below, the token may change the set ofsecurity modules that are members of a cryptographic domain, such as byadding or subtracting security modules from the cryptographic domain.

In an embodiment, the domain token includes a complete set ofoperational parameters that the security module operator 1710 desires toreplace operational parameters already present in the security modules1702. In other words, a domain token encodes all parameters that aresubject to change through the techniques described herein. However, inother embodiments the domain token may encode different information,such as information illustrating differences between a current domain ofthe security modules 1702 and a proposed domain. The domain token mayinclude various other information which allows the domain token to beauthenticated, such as one or more electronic signatures. The domaintoken may also include other information, such as a proposed versionidentifier for the proposed domain, an identifier of the operator thatrequested the domain token and/or an identifier of the security modulethat generated the token.

Once the security module operator 1710 receives a domain token from thesecurity module 1702 to which the security module operator submitted thedomain change request, the security module operator 1710 may provide thedomain token to the security module coordinator 1704 in a domaininstallation request. A domain installation request may be a request forthe security module coordinator 1704 to cause the security modules 1702to synchronize to the operational parameters encoded by the domaintoken. In other words, the domain installation request may be a requestfrom the security module operator 1710 to the security modulecoordinators 1704 for the security module coordinator 1704 tosynchronize the security modules 1702 to a state proposed by thesecurity module operator and encoded in the domain token.

In an embodiment, once the security module coordinator 1704 receivesfrom the security module operator 1710 the domain installation requestto install the domain token, the security module coordinator 1704 maymake a determination whether to fulfill the domain installation request.In addition to operations such as determining whether the request isauthentic and/or whether the operator that submitted the request ispermitted (by any permissions stored for the operator and/or whether anyquorum rules are satisfied, the security module coordinator maydetermine based at least in part on a version of the domain proposed inthe domain token, and a version of the domain currently installed in thesecurity modules 1702, whether to fulfill the request.

In an embodiment, domains have corresponding versions which may beidentified by version numbers, which may be serially updated. When asecurity module 1702 receives a domain change request, the securitymodule 1702 may provide a domain token that identifies a version for theproposed domain that is greater than the version of the domain currentlyinstalled on the security module. As an example, if the security module1702 has installed domain version number 192427, the security module1702 may generate a token with a proposed version number of 192428. Thesecurity module coordinator 1704 may accordingly compare the domainversion number of the domain proposed in the domain token with anotherdomain version, which may be the domain version already or currentlybeing processed by the security module coordinator. Referring to theprevious example, if the latest domain version that the coordinator hasinstalled is 192427, the security module coordinator may allow a requestto install a domain with proposed version number 192428 (or higher) butmay deny a request to install a domain with a proposed version number of192427 or lower. In this manner, the security module coordinator 1704 isable to ensure that inconsistent domains are not installed on thesecurity modules 1702. For instance, if the security module coordinator1704 has submitted a domain ingestion request to one or more securitymodules 1702 for version number 192427, and then receives a domain tokenproposing a domain with version 192427, the security module coordinatorcan determine to not install the received domain token since it mayconflict with the other domain already installed or in the process ofbeing installed on the security modules 1702.

Other information about a proposed domain may be used, in addition to orin alternative to domain version numbers, by the security modulecoordinator 1704 to determine whether to install the proposed domain.For example, in some embodiments, domain version information may includea hash calculated over some portion of the domain or other informationbased at least in part on the operational parameters encoded in thatdomain version. This information may be further based on informationrelated to prior states related to the domain, where the information isusable to determine that a new domain version supersedes the exactcurrent state operating as well as all prior states (to excludeconflicting domains generated in error cases from being accepted). Thus,determining by the security module coordinator 1704 to install aproposed domain may require analyzing the domain information todetermine that the proposed domain supersedes the current domain as wellas all prior states.

Once the security module coordinator 1704 determines to fulfill thedomain installation request, the security module coordinator 1704 maysubmit domain ingestion requests to each of the security modules 1702that are members of the domain proposed in the domain token. Asdiscussed in more detail below, the domain token may include informationthat when received by a security module 1702 enables the security module1702 to authenticate and update its operational parameters in accordancewith information encoded in the domain token. Once a security module1702 has installed a domain, the security module 1702 may beginoperating in accordance with the updated operational parameters.

FIG. 18 shows an illustrative representation of a domain token 1800 inaccordance with various embodiments. In an embodiment, the domain tokenis an organized collection of information that encodes proposedoperational parameters for each security module of a cryptographicdomain. As illustrated in FIG. 18, the domain token 1800 includes asecurity module package 1802 for each security module that is proposedto be a member of the proposed domain, a domain sub-token 1804, and anelectronic signature 1806 of the domain sub-token (or other informationcontained in the domain token 1800). The security module package 1802for a security module may include information specific to acorresponding security module in a cryptographic domain, such as anencrypted key 1808. In the embodiment illustrated in FIG. 18, a securitymodule package 1802 includes a random key (discussed below) encryptedunder a public key of a public private key pair specific to the securitymodule for which the security module package is generated. In thismanner, a security module may use its private key of the public privatekey pair to decrypt the random key and use the decrypted random key to,as discussed in the following paragraphs, decrypt the one or more domainkeys that, in the domain sub-token 1804, are encrypted under the randomkey.

The domain sub-token 1804 may include various operational parameters forthe proposed domain, for example, as illustrated in FIG. 18, the domainsub-token 1804 includes one or more domain keys encrypted under a randomkey which may be randomly generated by the security module thatgenerates the domain token 1800. The domain sub-token 1804 may alsoinclude identifiers for one or more security modules proposed to bemembers of the cryptographic domain (authorized security modules), whichmay be the same identifiers of security modules that are currentlymembers of the cryptographic domain if the domain is to be unchanged inthis respect. The domain sub-token 1804 may also identify one or moreauthorized operators where the authorized operator may be humanoperators or non-human operators, such as the security modulecoordinator 1704 discussed above in connection with FIG. 17 and/or oneor more servers operable to submit requests to perform cryptographicoperations to the security modules of the cryptographic domain, whichmay be servers of a frontend system, such as described above.

A domain sub-token 1804 may also encode one or more domain quorum rules.A domain quorum rule may be a rule that specifies a quorum of operatorsrequired for fulfillment of a request, such as any request whosefulfillment includes generating a domain token. For example, referringto FIG. 17 the environment 1700 illustrates a single security moduleoperator 1710. The environment 1700 may be configured, however, torequire a request electronically signed by multiple security moduleoperators 1710 before a request of a certain type is fulfilled. In thisexample, fulfillment of the request may be denied if the request doesnot include a valid signature for each member of a set of operators thatsatisfies the quorum rules. A domain quorum rule may specify a minimumnumber of operators required or may specify more complex rules. Further,a different domain quorum rule may be included for different types ofrequests. For example, one type of a request may have one domain quorumrule and another type of request may have another domain quorum rule. Inaddition, a domain sub-token may encode on or more operator permissions.Operator permissions may specify for a particular operator one or moreoperations that are permitted for a particular operator. There may beoperator permissions for multiple operators. A security module may beconfigured to enforce the permissions, quorum rules, and ensure thatrequests are only processed if received from an authorized operator orset of operators.

As noted above, a security module package 1802 may include an electronicsignature 1806 of the domain sub-token 1804 of the correspondingsecurity module package 1802. The electronic signature may be generatedusing the random key discussed above or another key to which securitymodule corresponding to the security module package has access. Forinstance, the electronic signature of a security module package for asecurity module may be generated using a public key of a public-privatekey pair, where the security module has access to the private key. Otherinformation may also be included in the domain token 1800, such asinformation enabling a security module to select the appropriatesecurity module package (i.e., the package that the security module isable to decrypt using its private key). In addition, a domain token mayinclude a serial number or other identifier of a proposed version forthe domain.

As noted above, various embodiments of the present disclosure relate tocoordination of security modules. FIG. 19 accordingly shows anillustrative example of a process 1900 that may be used to coordinatesecurity modules. The process may be performed by any suitable system,such as a security module coordinator such as described above inconnection with FIG. 17. In an embodiment, the process 1900 includesreceiving 1902, a domain installation request, which may, for example,include a domain token such as described above. The process 1900 mayalso include determining 1904 a requested (proposed) domain serialnumber, which may be included in or otherwise with the domain token.Further, the process 1900 may include determining 1906 a current domainserial number, which may be a serial number for a domain that has beeninstalled in one or more security modules, such as described above. Aswith other operations, determining the requested (proposed) domainserial number and the current domain serial number may be performed inan order different than that which is illustrated in FIG. 19.

A determination may then be made 1908 whether the requested domainserial number is greater than the current domain serial number. Otherchecks may also be made, such as whether the requested domain iscompatible with a currently installed domain. Such checks may includedetermining whether the requested domain is a descendent of thecurrently installed domain (e.g., whether a domain token encodingoperational parameters for the requested domain was generated by adevice that had the currently installed domain installed), whether thecurrently installed domain and requested domain share commoninformation, such as one or more common domain keys and/or whether otherconditions are satisfied. If it is determined 1908 that the requesteddomain serial number is greater than the current domain serial number(and/or that the requested domain is compatible with the currentlyinstalled domain), the process 1900 may include submitting 1910 a domainingestion request to a plurality of security modules, which may be thesecurity modules of the proposed domain and/or of the current domain.The domain ingestion request may be a request to update operationalparameters in accordance with the operational parameters encoded in thedomain token. If, however, it is determined 1908 that the requesteddomain serial number is not greater than the current domain serialnumber, then the process 1900 may include denying 1912 the domaininstallation request. Denying 1912 the domain installation request maybe performed in any suitable manner, such as by transmitting a messagethat the request is denied or simply taking no action. In this manner, adomain token having a version that is not greater than a version that isalready installed on one or more security modules prevents a conflictingdomain from being installed on another security module. In this manner,it can be assured that the operational parameters by which the securitymodules operate are consistent.

Security modules themselves may also be configured to preventinstallation of domains that conflict with other domains or that areotherwise improper. FIG. 20 accordingly shows an illustrative example ofa process 2000 for processing requests to ingest a domain. In anembodiment, the process 2000 includes receiving 2002 a domain ingestionrequest such as described above in connection with FIG. 17. For example,a security module performing the process 2000 may receive a domainingestion request with the domain token from a security modulecoordinator. The security module may then use 2004 a private key of apublic private key pair to decrypt a random key included in the domaintoken and encrypted under a public key of the public private key pair.The decrypted random key may then be used to determine 2006 whether asignature of the domain token is valid. For example, the security moduleperforming the process 2000 may use the decrypted random key to generatea reference signature for a domain sub-token provided with the requestand compare the generated reference signature with a signature includedin the domain token to determine whether the signatures match, a matchindicating that the signature is valid. Other ways of determining thevalidity of a signature of the request and/or, generally, whether therequest is authentic may also be used. Further, as discussed above, oneor more checks whether the requested domain is compatible with acurrently installed domain or, generally, whether one or moreprerequisite conditions for installing the requested domain aresatisfied may also be performed.

If it is determined 2006 that the signature is valid (and/or that one ormore conditions for installability of the requested domain aresatisfied), the process 2000 may include using 2008 the random key todecrypt one or more domain keys that are encrypted in the domain tokenunder the random key. The one or more domain keys and/or otheroperational parameters included by the domain token may then be used toupdate 2010 the operational parameters of the security module performingthe process 2000. That is, the security module may reconfigure itself tooperate in accordance with the operational parameters included in thedomain token. If, however, it is determined 2006 that the signature ofthe domain sub-token is invalid, the process 2000 may include denying2012 the request such as described above. As with all processesdescribed herein, variations are considered as being within the scope ofthe present disclosure. For example, the signature may be generatedusing any key to which a security module has access to enable thesecurity module to verify the signature.

In various embodiments, security modules supporting a cryptographyservice do not themselves store customer keys, although variations wheresecurity modules store customer keys are considered as being within thescope of the present disclosure. Alternatively, customer keys areencrypted under a domain key and stored externally to the securitymodules, such as in a separate data storage system which may be operatedas a service accessible through appropriately configured applicationprogramming interface (API) calls. Requests to perform cryptographicoperations in connection with a customer key may be fulfilled byaccessing the encrypted customer key from the external storage,providing the encrypted customer key to a security module which may thendecrypt the customer key to perform the one or more cryptographicoperations. However, as noted above, domain keys may change over time.For example, domain keys may be rotated to ensure that security modulesdo not perform so many operations that a cryptographic attack on thesecurity of a cryptography service, and therefore on one or morecustomer keys, is enabled. Further, domain keys may be rotated so that,should a domain key be compromised by becoming accessible to anunauthorized entity, the lifetime during which the domain key is usableis limited.

FIG. 21, accordingly shows an illustrative example of a process 2100which may be performed to rotate domain keys such that customer keys arere-encrypted as appropriate. The process 2100 may be performed by anysuitable system, such as by a coordinator described above or anothersystem (operator) authorized to communicate with a set of securitymodules. Generally speaking, the process 2100 includes updating acryptographic domain to include a new domain key, identifying customerkeys encrypted under the old domain key that is to be replaced by thenew domain key, re-encrypting the identified customer keys under the newdomain key and then performing an additional change of the domain toremove from the domain the old domain key. In this manner, securitymodules are able to perform cryptographic operations with customer keysduring the process of a domain key rotation, regardless of whether thecustomer keys are encrypted under the old domain key or the new domainkey at any given time during the rotation. In other words, during adomain key rotation, security modules may be configured with the abilityto decrypt and use customer keys that are encrypted under the old domainkey until the process is complete.

Referring to FIG. 21, in an embodiment the process 2100 includesperforming 2102 a domain change process to add a new domain key to acryptographic domain. The domain change process may be any suitableprocess that results in addition of the new domain key to the domain,such as the process 1900 discussed above in connection with FIG. 19. Adetermination may then be made 2104 whether the domain has beensuccessfully updated in all the security modules (SMs) for which theupdate is required. If it determined 2104 that the domain has not beenupdated in all the security modules, a process for an unsuccessfuldomain change may be performed 2106. The process for an unsuccessfuldomain change may include waiting for a period of time and re-checking2104 whether the domain has been updated in all the security modules.The process for an unsuccessful domain change may also include otheractions such as by including notifying one or more operators so that theoperators may take appropriate action.

If/when it is determined 2104 that the domain has been updated in allthe security modules, the process 2100 may include obtaining 2108 a listof customer keys encrypted under the old domain key. A first customerkey encrypted under the old domain key may be identified 2110. Adetermination may then be made 2112 whether the identified customer keyis marked for electronic shredding, where electronic shredding may referto any process where access to information is intentionally andirrevocably lost, such as by losing access to a key under which theinformation is encrypted, such as described below. If it is determined2112 that the identified customer key is marked for shredding, then theidentified customer key is not encrypted under the new domain key. Inthis manner, once access to the old domain key is lost, access to thecustomer hey is also lost. In other words, the identified customer keyhas been electronically shredded when access to the key under which thecustomer key is encrypted has been lost.

As illustrated in FIG. 21, the process 2100 may include determining 2114whether there are additional customer keys encrypted under the olddomain key. If it is determined 2114 that there are additional keysencrypted under the old domain key, the process 2100 may includeidentifying 2110 the next customer key encrypted under the old domainkey. As described above, if it is determined 2112 that the identifiednext customer key is marked for shredding, the identified next customerkey is not encrypted under the new domain key.

These operations may repeat as illustrated in FIG. 21 until it isdetermined 2112 that the identified next customer key is not marked forshredding. If it is determined 2112 that the identified next customerkey is not marked for shredding, the process 2100 may include accessing2116 the identified customer key and transmitting 2118 the encryptedcustomer key to a security module for refreshing to the new domain key(i.e., for performing a process that results in the encrypted customerkey being encrypted in a manner decryptable using the new domain key).Transmitting 2118 the encrypted customer key to a security module may beperformed, for example, referring to FIG. 17 by transmitting thecustomer key to any of the security modules 1702 described above inconnection with FIG. 17.

The security module may then decrypt the encrypted customer key usingthe old domain key, and may re-encrypt the customer key using the newdomain key. Accordingly, the process 2100, as illustrated in theembodiment shown in FIG. 21, includes receiving 2120 the customer keyencrypted under the new domain key. The customer key encrypted under thenew domain key may then be stored 2122 such as by storing 2122 thereceived customer key under the new domain key and the encrypted keyrepository 1708 described above in connection with FIG. 17.

A determination may then be made 2114 whether there are additionalcustomer keys encrypted under the old domain key. This process maycontinue until it is determined 2114 that there are no additional keysencrypted under the old domain key. Once determined 2114 that there areno additional customer keys encrypted under the old domain key, theprocess 2100 may include performing 2124 a domain change process toremove the old domain key from the domain. The domain change process maybe a process such as described above in connection with FIG. 19 where asecurity module operator submits a domain change request to a securitymodule or receives a domain token, provides the domain token to asecurity module coordinator which may then cause the domain to beingested in the security modules. The security modules, as a result ofingesting the token (i.e., by updating operational parameters inaccordance with the token) may lose access to the old domain key. Insome embodiments, for example, the security modules are configured suchthat domain keys are only stored in volatile memory such that domainkeys are eventually overwritten or lost when power to the volatilememory is lost. It should be noted that explicit actions that result inloss of the old domain key may be performed by the security modules,such as by intentionally overwriting one or more memory locations inwhich the domain key is stored. In this manner, once the securitymodules lose access to the old domain key, keys that have been markedfor shredding are effectively lost, that is, are practicallyinaccessible since the old domain key is no longer accessible to decryptthe keys marked for shredding.

As noted above, various systems, such as a system utilizing theenvironment 1700 may mark the shredding status of customer keys, such aswhen customers request or policy otherwise dictates that customer keysshould be shredded. Accordingly, the process 2100 may include marking2126 any of the customer keys with a “shred pending” status to a “shredcomplete” status. In this manner, customers and a provider to thecustomers are informed, such as by querying the keys' status, thatcustomer keys have, in fact, been electronically shredded.

To enable various efficiencies and security enhancements, a cryptographyservice may store and utilize cryptographic keys in various ways.Further, as noted above, a cryptography service may operate inconnection with other services such as data storage services. FIG. 22accordingly shows an illustrated example of an environment 2200 in whichvarious services may operate concurrently. As illustrated in FIG. 22 adata storage service 2202 is configured to communicate with acryptography service 2204. For example, the data storage service 2202and the cryptography service 2204 may be configured to configureappropriate API calls to each other for the purpose of transferringinformation and submitting requests and responses to the requests to oneanother.

As noted above, a data storage service 2202 may store a plurality ofdata objects 2206. Some, or even all, of the data objects 2206 may beencrypted utilizing the cryptography service 2204. As illustrated in2204, data 2208 of the data object 2206 may be encrypted under a dataobject key 2210. The data object 2206 may also include the data objectkey 2210 encrypted under a customer key 2212 of a customer of the datastorage service and the cryptography service 2204. In other words, thedata object 2206 may include data encrypted under a key and the keyencrypted under another key. In this manner, the data of the data objectis stored in encrypted form with the key usable to decrypt the data, butthe key is in encrypted form for the purpose of security. In otherwords, unauthorized access to the data object does not, by itself,enable access to the data inside of the data object in plaintext form.As shown in FIG. 22, the cryptography service 2204 may store thecustomer key 2212 encrypted under a domain key 2214 such as describedabove. For instance, referring to FIG. 17, a cryptography service maystore the customer key 2212 encrypted under the domain key 2214 in theencrypted key repository 1708 of the environment 1700 described above inconnection with FIG. 17.

As noted, the cryptography service 2204 may store multiple customer keysin this manner. As further noted above further, the cryptography service2204 may include a plurality of security modules 2216 such as describedabove that store securely the domain key 2214. In this manner, the datastorage service 2202 may interact with the cryptography service 2204 fordecryption of the data object key. The data storage service 2202 may,for instance, provide the data object key 2210 encrypted under thecustomer key 2212 to the cryptography service 2204. The cryptographyservice 2204 may utilize a security module 2216 to use the domain key2214 to decrypt the customer key 2212 and use the customer key 2212 todecrypt the data object key 2210. The data object key 2210 in plain textform may then be provided to the data storage service 2202, which maythen use the data object key 2210 to decrypt the data 2208.

Variations, of course, are considered as being within the scope of thepresent disclosure. For example, the security module 2216 may be used todecrypt the data 2208 using the data object key 2210, thereby neverproviding the data storage service 2202 access to the data object key2210.

FIG. 23 shows an illustrative example of a process 2300 which may beused to provide cryptographic services to another service. For example,the process 2300 may be performed by the cryptography service 2204discussed above in connection with FIG. 22 in order to provide servicesto the data storage service 2202, and ultimately to a customer of thedata storage service 2202. Returning to FIG. 23, in an embodiment, theprocess 2300 includes receiving 2302 a request for a new key. Referringto FIG. 22, for instance, the cryptography service 2204 may receive anelectronic request in an appropriately configured API call from the datastorage service 2202. Upon receipt of the request for the new key, theprocess 2300 may include accessing 2304 a customer key that is encryptedunder a domain key. Referring to FIG. 17, for example, a web server ofthe cryptography service may access the customer key from the encryptedkey repository 1708. It should be noted that the request for the new keymay identify, that is provide an identifier, for the customer key to beused.

Once the customer key has been accessed 2304, the customer key which isencrypted under the domain key may be transmitted 2306 to a securitymodule, such as one of the security modules 1702 described above inconnection with FIG. 17. The security module may then use its access tothe domain key to decrypt the customer key. The security module maygenerate (e.g., randomly) or otherwise obtain a key and encrypt thegenerated key with the customer key. Accordingly, the process 2300 mayinclude receiving 2308 a new key encrypted under the customer key and inplaintext form from the security module that performed the encryption.The received new key in encrypted and plaintext form may then beprovided 2310 in response to the request that was received 2302. Inaddition, the new key unencrypted by the customer key may also beprovided in response to the request. In this manner, the data storageservice can use the new key to encrypt data and then electronicallyshred the new key, leaving only the encrypted key accessible.

As with all processes described herein, variations are considered asbeing within the scope of the present disclosure. For example, in someembodiments the process 2300 is modified such that a request to encrypta key is received. The data storage service may, for instance, generatea data object key, use the generated data object key to encrypt data ofa data object and then provide the generated data object key to thecryptography service, which as described in connection with FIG. 23, mayencrypt the data object key by accessing an appropriate customer keyproviding the encrypted customer key and the data object key to asecurity module, which may encrypt the data object key.

Various embodiments of the present disclosure may also be used to enablethe use of sessions so that various components of a cryptography serviceenvironment, such as the environment 1700 discussed above in connectionwith FIG. 17 can operate more efficiently. FIG. 24 accordingly shows anillustrative example of a process 2400 which may be used to enable theuse of sessions. In an embodiment, the process 2400 includes receiving2402 from an operator a request to create and expose a key. An exampleoperator is the security module coordinator 1704 discussed above inconnection with FIG. 17, or another component such as a componentinvolved in the processing of requests submitted by customers and/orother services, such as in a frontend system, described above. Therequest may be authenticated using an operator key, which, as anexample, may be a secret shared between the security module and theoperator. For instance, the operator may sign the request using theoperator key. Upon receipt 2403 of the request to create and expose akey, the process 2400 may include generating 2404 a key token. The keytoken may include a session key, an identifier of the operator to usethe session key, and an expiration (e.g., time of expiration) allencrypted under a domain key of the current cryptographic domain. Thesession key may be, for example, a key that is randomly generated. Thekey token may also include an identifier of the domain key under whichthe data of the key token is encrypted to enable, for example, selectionof an appropriate domain key should multiple domain keys be availablefor use. The generated key token may then be provided 2406 along withthe plaintext session key in response to the request that was received2402. The plaintext session key (and key token) can be provided over asecure channel, such as a secure socket layer (SSL) connection or byencrypting the session key using a public key of a public-private keypair where the operator has access to the private key of thepublic-private key pair. It should be noted that, while a single sessionkey in a key token is used throughout the present disclosure for thepurpose of illustration, more than one session key may be included in akey token. For instance, in some embodiments, a session key for eachdirection of communications traffic (inbound/outbound, e.g.) may beencoded in a key token in accordance with the various techniquesdescribed herein. Similarly, a key token may include one or more keysfor message signing and one or more keys for encryption/decryption.

Once an operator obtains a key token that encodes a session key (whichmay be referred to as an operator key token), the operator may use thesession key and key token to submit requests to various security modulesfor a time during which the key token has not expired. FIG. 25,accordingly, shows an illustrative example of a process 2500 forprocessing requests to perform cryptographic operations in accordancewith an embodiment. The process 2500 may be performed by any suitablesystem, such as a security module, as described above. As illustrated inFIG. 25, the process 2500 includes receiving 2502 an operator key tokenand encrypted requests to perform a cryptographic operation (or multiplecryptographic operations). The request may be encrypted and digitallysigned under the session key of the operator key token that was received2502 with the request. In other words, in an embodiment, the request mayinclude a digital signature that, to be valid, was generated byinputting the request and session key into a digital signaturealgorithm.

Upon receiving 2502 the request and operator key token, the process 2500may include using 2504 the domain key to decrypt the received 2502operator key token. A determination may then be made 2506 whether theoperator key token is valid. The determination 2506 whether the operatorkey token is valid may include determining whether the operator thatsubmitted the key is the operator identified in the operator key token,whether the operator key token was received within a time during whichthe operator key token is valid, as indicated by the expiration in theoperator key token, and whether the digital signature of the request isvalid (such as described above). If all conditions for the operator keytoken being valid are not satisfied, the process 2500 may includedetermining 2506 that the operator key token is invalid and, therefore,deny 2508 the request, such as described above. If, however, allconditions for the operator key token being valid are satisfied, theprocess 2500 may include determining 2506 that the operator key token isvalid and may then include using 2510 the session key of the operatorkey token to decrypt the request.

As noted above, the request may include a key token that includes anencrypted key and an identifier of a domain key usable to decrypt theencrypted key. The process 2500 may, accordingly, include using thedomain key identified in the key token of the decrypted request todecrypt 2512 the key in the key token of the decrypted request. Once thekey of the key token has been decrypted 2512, the process 2500 mayinclude performing 2514 the requested cryptographic operation(s) on dataencoded in the decrypted request using the decrypted key. One or moreresults may be generated as a result of performing the one or morecryptographic operations (such as plaintext, ciphertext, a digitalsignature, or result of verifying a digital signature). Accordingly, theprocess 2500 may include encrypting 2516 the result(s) of performing thecryptographic operation(s) using the session key. The encryptedresult(s) may then be provided 2518 in response to the request that wassubmitted 2512.

In this manner, the operator is able to perform a relativelycomputationally intensive negotiation with a security module to receivea session key which may be used during a time period (determined by theexpiration in an operator key token), where use of the session key mayutilize a relatively lower amount of computational resources. Forexample, cryptographic operations using a session key may be performedusing one or modes of the Advanced Encryption Standard while obtainingthe session key from the security module may require relatively morecomputational resources. In other words, the operator is able to performa relatively more difficult negotiation in order to obtain a session keythat is computationally easier to use to interact with the securitymodules.

FIG. 26 illustrates aspects of an example environment 2600 forimplementing aspects in accordance with various embodiments. As will beappreciated, although a web-based environment is used for purposes ofexplanation, different environments may be used, as appropriate, toimplement various embodiments. The environment includes an electronicclient device 2602, which can include any appropriate device operable tosend and receive requests, messages or information over an appropriatenetwork 2604 and convey information back to a user of the device.Examples of such client devices include personal computers, cell phones,handheld messaging devices, laptop computers, tablet computers, set-topboxes, personal data assistants, embedded computer systems, electronicbook readers and the like. The network can include any appropriatenetwork, including an intranet, the Internet, a cellular network, alocal area network or any other such network or combination thereof.Components used for such a system can depend at least in part upon thetype of network and/or environment selected. Protocols and componentsfor communicating via such a network are well known and will not bediscussed herein in detail. Communication over the network can beenabled by wired or wireless connections and combinations thereof Inthis example, the network includes the Internet, as the environmentincludes a web server 2606 for receiving requests and serving content inresponse thereto, although for other networks an alternative deviceserving a similar purpose could be used as would be apparent to one ofordinary skill in the art.

The illustrative environment includes at least one application server2608 and a data store 2610. It should be understood that there can beseveral application servers, layers or other elements, processes orcomponents, which may be chained or otherwise configured, which caninteract to perform tasks such as obtaining data from an appropriatedata store. Servers, as used herein, may be implemented in various ways,such as hardware devices or virtual computer systems. In some contexts,servers may refer to a programming module being executed on a computersystem. As used herein the term “data store” refers to any device orcombination of devices capable of storing, accessing and retrievingdata, which may include any combination and number of data servers,databases, data storage devices and data storage media, in any standard,distributed or clustered environment. The application server can includeany appropriate hardware and software for integrating with the datastore as needed to execute aspects of one or more applications for theclient device, handling some (even a majority) of the data access andbusiness logic for an application. The application server may provideaccess control services in cooperation with the data store and is ableto generate content such as text, graphics, audio and/or video to betransferred to the user, which may be served to the user by the webserver in the form of HyperText Markup Language (“HTML”), ExtensibleMarkup Language (“XML”) or another appropriate structured language inthis example. The handling of all requests and responses, as well as thedelivery of content between the electronic client device 2602 and theapplication server 2608, can be handled by the web server. It should beunderstood that the web and application servers are not required and aremerely example components, as structured code discussed herein can beexecuted on any appropriate device or host machine as discussedelsewhere herein. Further, operations described herein as beingperformed by a single device may, unless otherwise clear from context,be performed collectively by multiple devices, which may form adistributed system.

The data store 2610 can include several separate data tables, databasesor other data storage mechanisms and media for storing data relating toa particular aspect of the present disclosure. For example, the datastore illustrated may include mechanisms for storing production data2612 and user information 2616, which can be used to serve content forthe production side. The data store also is shown to include a mechanismfor storing log data 2614, which can be used for reporting, analysis orother such purposes. It should be understood that there can be manyother aspects that may need to be stored in the data store, such as forpage image information and to access right information, which can bestored in any of the above listed mechanisms as appropriate or inadditional mechanisms in the data store 2610. The data store 2610 isoperable, through logic associated therewith, to receive instructionsfrom the application server 2608 and obtain, update or otherwise processdata in response thereto. In one example, a user, through a deviceoperated by the user, might submit a search request for a certain typeof item. In this case, the data store might access the user informationto verify the identity of the user and can access the catalog detailinformation to obtain information about items of that type. Theinformation then can be returned to the user, such as in a resultslisting on a web page that the user is able to view via a browser on theelectronic client device 2602. Information for a particular item ofinterest can be viewed in a dedicated page or window of the browser. Itshould be noted, however, that embodiments of the present disclosure arenot necessarily limited to the context of web pages, but may be moregenerally applicable to processing requests in general, where therequests are not necessarily requests for content.

Each server typically will include an operating system that providesexecutable program instructions for the general administration andoperation of that server and typically will include a computer-readablestorage medium (e.g., a hard disk, random access memory, read onlymemory, etc.) storing instructions that, when executed by a processor ofthe server, allow the server to perform its intended functions. Suitableimplementations for the operating system and general functionality ofthe servers are known or commercially available and are readilyimplemented by persons having ordinary skill in the art, particularly inlight of the disclosure herein.

The environment in one embodiment is a distributed computing environmentutilizing several computer systems and components that areinterconnected via communication links, using one or more computernetworks or direct connections. However, it will be appreciated by thoseof ordinary skill in the art that such a system could operate equallywell in a system having fewer or a greater number of components than areillustrated in FIG. 26. Thus, the depiction of the example environment2600 in FIG. 26 should be taken as being illustrative in nature and notlimiting to the scope of the disclosure.

The various embodiments further can be implemented in a wide variety ofoperating environments, which in some cases can include one or more usercomputers, computing devices or processing devices which can be used tooperate any of a number of applications. User or client devices caninclude any of a number of general purpose personal computers, such asdesktop, laptop or tablet computers running a standard operating system,as well as cellular, wireless and handheld devices running mobilesoftware and capable of supporting a number of networking and messagingprotocols. Such a system also can include a number of workstationsrunning any of a variety of commercially-available operating systems andother known applications for purposes such as development and databasemanagement. These devices also can include other electronic devices,such as dummy terminals, thin-clients, gaming systems and other devicescapable of communicating via a network.

Various embodiments of the present disclosure utilize at least onenetwork that would be familiar to those skilled in the art forsupporting communications using any of a variety ofcommercially-available protocols, such as Transmission ControlProtocol/Internet Protocol (“TCP/IP”), protocols operating in variouslayers of the Open System Interconnection (“OSI”) model, File TransferProtocol (“FTP”), Universal Plug and Play (“UpnP”), Network File System(“NFS”), Common Internet File System (“CIFS”) and AppleTalk. The networkcan be, for example, a local area network, a wide-area network, avirtual private network, the Internet, an intranet, an extranet, apublic switched telephone network, an infrared network, a wirelessnetwork and any combination thereof.

In embodiments utilizing a web server, the web server can run any of avariety of server or mid-tier applications, including Hypertext TransferProtocol (“HTTP”) servers, FTP servers, Common Gateway Interface (“CGP”)servers, data servers, Java servers and business application servers.The server(s) also may be capable of executing programs or scripts inresponse requests from user devices, such as by executing one or moreweb applications that may be implemented as one or more scripts orprograms written in any programming language, such as Java®, C, C# orC++, or any scripting language, such as Perl, Python or TCL, as well ascombinations thereof. The server(s) may also include database servers,including without limitation those commercially available from Oracle® ,Microsoft® , Sybase® and IBM®.

The environment can include a variety of data stores and other memoryand storage media as discussed above. These can reside in a variety oflocations, such as on a storage medium local to (and/or resident in) oneor more of the computers or remote from any or all of the computersacross the network. In a particular set of embodiments, the informationmay reside in a storage-area network (“SAN”) familiar to those skilledin the art. Similarly, any necessary files for performing the functionsattributed to the computers, servers or other network devices may bestored locally and/or remotely, as appropriate. Where a system includescomputerized devices, each such device can include hardware elementsthat may be electrically coupled via a bus, the elements including, forexample, at least one central processing unit (“CPU” or “processor”), atleast one input device (e.g., a mouse, keyboard, controller, touchscreen or keypad) and at least one output device (e.g., a displaydevice, printer or speaker). Such a system may also include one or morestorage devices, such as disk drives, optical storage devices andsolid-state storage devices such as random access memory (“RAM”) orread-only memory (“ROM”), as well as removable media devices, memorycards, flash cards, etc.

Such devices also can include a computer-readable storage media reader,a communications device (e.g., a modem, a network card (wireless orwired), an infrared communication device, etc.) and working memory asdescribed above. The computer-readable storage media reader can beconnected with, or configured to receive, a computer-readable storagemedium, representing remote, local, fixed and/or removable storagedevices as well as storage media for temporarily and/or more permanentlycontaining, storing, transmitting and retrieving computer-readableinformation. The system and various devices also typically will includea number of software applications, modules, services or other elementslocated within at least one working memory device, including anoperating system and application programs, such as a client applicationor web browser. It should be appreciated that alternate embodiments mayhave numerous variations from that described above. For example,customized hardware might also be used and/or particular elements mightbe implemented in hardware, software (including portable software, suchas applets) or both. Further, connection to other computing devices suchas network input/output devices may be employed.

Storage media and computer readable media for containing code, orportions of code, can include any appropriate media known or used in theart, including storage media and communication media, such as, but notlimited to, volatile and non-volatile, removable and non-removable mediaimplemented in any method or technology for storage and/or transmissionof information such as computer readable instructions, data structures,program modules or other data, including RAM, ROM, Electrically ErasableProgrammable Read-Only Memory (“EEPROM”), flash memory or other memorytechnology, Compact Disc Read-Only Memory (“CD-ROM”), digital versatiledisk (DVD) or other optical storage, magnetic cassettes, magnetic tape,magnetic disk storage or other magnetic storage devices or any othermedium which can be used to store the desired information and which canbe accessed by the system device. Based on the disclosure and teachingsprovided herein, a person of ordinary skill in the art will appreciateother ways and/or methods to implement the various embodiments.

The specification and drawings are, accordingly, to be regarded in anillustrative rather than a restrictive sense. It will, however, beevident that various modifications and changes may be made thereuntowithout departing from the broader spirit and scope of the invention asset forth in the claims.

Other variations are within the spirit of the present disclosure. Thus,while the disclosed techniques are susceptible to various modificationsand alternative constructions, certain illustrated embodiments thereofare shown in the drawings and have been described above in detail. Itshould be understood, however, that there is no intention to limit theinvention to the specific form or forms disclosed, but on the contrary,the intention is to cover all modifications, alternative constructionsand equivalents falling within the spirit and scope of the invention, asdefined in the appended claims.

The use of the terms “a” and “an” and “the” and similar referents in thecontext of describing the disclosed embodiments (especially in thecontext of the following claims) are to be construed to cover both thesingular and the plural, unless otherwise indicated herein or clearlycontradicted by context. The terms “comprising,” “having,” “including”and “containing” are to be construed as open-ended terms (i.e., meaning“including, but not limited to,”) unless otherwise noted. The term“connected,” when unmodified and referring to physical connections, isto be construed as partly or wholly contained within, attached to orjoined together, even if there is something intervening. Recitation ofranges of values herein are merely intended to serve as a shorthandmethod of referring individually to each separate value falling withinthe range, unless otherwise indicated herein and each separate value isincorporated into the specification as if it were individually recitedherein. The use of the term “set” (e.g., “a set of items”) or “subset”unless otherwise noted or contradicted by context, is to be construed asa nonempty collection comprising one or more members. Further, unlessotherwise noted or contradicted by context, the term “subset” of acorresponding set does not necessarily denote a proper subset of thecorresponding set, but the subset and the corresponding set may beequal.

Conjunctive language, such as phrases of the form “at least one of A, B,and C,” or “at least one of A, B and C,” unless specifically statedotherwise or otherwise clearly contradicted by context, is otherwiseunderstood with the context as used in general to present that an item,term, etc., may be either A or B or C, or any nonempty subset of the setof A and B and C. For instance, in the illustrative example of a sethaving three members used in the above conjunctive phrase, “at least oneof A, B, and C” and “at least one of A, B and C” refers to any of thefollowing sets: {A}, {B}, {C}, {A, B}, {A, C}, {B, C}, {A, B, C}. Thus,such conjunctive language is not generally intended to imply thatcertain embodiments require at least one of A, at least one of B and atleast one of C to each be present.

Operations of processes described herein can be performed in anysuitable order unless otherwise indicated herein or otherwise clearlycontradicted by context. Processes described herein (or variationsand/or combinations thereof) may be performed under the control of oneor more computer systems configured with executable instructions and maybe implemented as code (e.g., executable instructions, one or morecomputer programs or one or more applications) executing collectively onone or more processors, by hardware or combinations thereof. The codemay be stored on a computer-readable storage medium, for example, in theform of a computer program comprising a plurality of instructionsexecutable by one or more processors. The computer-readable storagemedium may be non-transitory.

The use of any and all examples, or exemplary language (e.g., “such as”)provided herein, is intended merely to better illuminate embodiments ofthe invention and does not pose a limitation on the scope of theinvention unless otherwise claimed. No language in the specificationshould be construed as indicating any non-claimed element as essentialto the practice of the invention.

Preferred embodiments of this disclosure are described herein, includingthe best mode known to the inventors for carrying out the invention.Variations of those preferred embodiments may become apparent to thoseof ordinary skill in the art upon reading the foregoing description. Theinventors expect skilled artisans to employ such variations asappropriate and the inventors intend for embodiments of the presentdisclosure to be practiced otherwise than as specifically describedherein. Accordingly, the scope of the present disclosure includes allmodifications and equivalents of the subject matter recited in theclaims appended hereto as permitted by applicable law. Moreover, anycombination of the above-described elements in all possible variationsthereof is encompassed by the scope of the present disclosure unlessotherwise indicated herein or otherwise clearly contradicted by context.

All references, including publications, patent applications and patents,cited herein are hereby incorporated by reference to the same extent asif each reference were individually and specifically indicated to beincorporated by reference and were set forth in its entirety herein.

What is claimed is:
 1. A computer-implemented method, comprising: for aset of data objects encrypted with a first key that is accessible to aplurality of devices, terminating access to a first subset of the set ofdata objects by: reencrypting, using a second key, a second subset ofthe set of data objects; and ensuring that individual data objects ofthe set of data objects are accessible regardless of whether theindividual data objects are encrypted using the first key or the secondkey; and at a time after the second subset becomes accessible by usingthe second key: verifying that each of the plurality of devices hasaccess to the second key; and causing the plurality of devices to loseaccess to the first key.
 2. The computer-implemented method of claim 1,wherein: the set of data objects is associated with a customer of aservice provider; and the method further comprises receiving aselection, from the customer, of the first subset for electronicshredding.
 3. The computer-implemented method of claim 1, furthercomprising selecting the second subset to exclude data objects of theset of data objects that are marked for electronic shredding.
 4. Thecomputer-implemented method of claim 1, wherein causing the device toreencrypt the second subset includes accessing, based at least in parton the second subset being associated with the first key, a data objectof the second subset from a data storage system.
 5. Thecomputer-implemented method of claim 1, wherein the plurality of devicesare security modules.
 6. The computer-implemented method of claim 1,further comprising determining, based at least in part on a lack of arequest to mark a particular data object of the set of data objects forelectronic shredding, that the particular data object of the set of dataobjects is not selected for electronic shredding.
 7. Thecomputer-implemented method of claim 1, wherein a data object of the setof data objects is a cryptographic key used by the plurality of devicesto perform cryptographic operations.
 8. A system, comprising: one ormore processors; and memory including executable instructions which, asa result of execution by the one or more processors, cause the systemto, for a set of data objects encrypted with a first key that isaccessible to a plurality of devices: cause the plurality of devices tolose access to a first subset of the set of data objects by causing theplurality of devices to: reencrypt, using a second key, a second subsetof the set of data objects; allow access to an individual data object ofthe second subset regardless of whether the individual data object isencrypted using the first key or the second key; and at a time after theindividual data object becomes accessible by using the second key, causethe plurality of devices to lose access to the first key.
 9. The systemof claim 8, wherein the set of data objects is a plurality ofcryptographic keys.
 10. The system of claim 8, wherein causing thedevice to allow access to the individual data object includes causingthe device to: receive an identifier associated with the individual dataobject; and select one of the first key or the second key based at leastin part on the identifier.
 11. The system of claim 8, wherein: theexecutable instructions further include instructions that cause thesystem to associate the first subset with a first status indicating thatelectronic shredding is pending; and the executable instructions includeinstructions that cause the device to, further at the time after theindividual data object becomes accessible by using the second key,associate the first subset with a second status that indicates thatelectronic shredding of the first subset has been completed.
 12. Thesystem of claim 8, wherein the executable instructions includeinstructions that cause the system to receive a request to replace thefirst key with the second key in accordance with a rotation schedule forthe set of data objects.
 13. The system of claim 8, wherein theexecutable instructions include instructions that cause the system tocause the plurality of devices to use at least a third subset of the setof data objects to perform cryptographic operations as a service to acustomer of the service.
 14. The system of claim 8, wherein: the firstsubset is a proper subset of the set of data objects; and the secondsubset is mutually exclusive of the first subset.
 15. A non-transitorycomputer-readable storage medium that stores executable instructionswhich, as a result of being executed by one or more processors of acomputer system, cause the computer system to, for a set of data objectsencrypted with a first key that is accessible to a plurality of devices,at least: cause the plurality of devices to terminate access to a firstsubset of the set of data objects by causing the plurality of devicesto: reencrypt, using a second key, a second subset of the set of dataobjects different from the first subset; and allow access to anindividual data object of the second subset regardless of whether theindividual data object is encrypted using the first key or the secondkey; and at a time after the second subset becomes accessible by usingthe second key, cause the plurality of devices to lose access to thefirst key.
 16. The non-transitory computer-readable storage medium ofclaim 15, wherein the individual data object is a cryptographic key usedby the plurality of devices to perform cryptographic operations.
 17. Thenon-transitory computer-readable storage medium of claim 15, wherein theexecutable instructions further cause the computer system to transmitthe second subset to a data storage service.
 18. The non-transitorycomputer-readable storage medium of claim 15, wherein the executableinstructions that cause the computer system to cause device to allowaccess to the individual data object include instructions that cause thecomputer system to: provide, to a selected device from the plurality ofdevices, a request that includes the first key and the second key;receive a response that includes an encrypted first key and an encryptedsecond key, the encrypted first key and the encrypted second key beingdecryptable by individual devices of the plurality of devices to obtainthe first key and second key; and provide the encrypted first key andthe encrypted second key to the individual devices of the plurality ofdevices.
 19. The non-transitory computer-readable storage medium ofclaim 15, wherein the executable instructions that cause the computersystem to cause the plurality of devices to lose access to the first keyinclude instructions that cause the computer system to: provide arequest, to a selected device from the plurality of devices, for a setof operational parameters for the plurality of devices for which thefirst key has been replaced by the second key; receive a response thatincludes the set of operational parameters; and provide the set ofoperational parameters received to the plurality of devices.
 20. Thenon-transitory computer-readable storage medium of claim 15, wherein:the second subset is a proper subset of the set of data objectsencrypted under the first key; and the executable instructions includeinstructions that further cause the computer system to select the secondsubset based at least in part on the individual data object lacking anassociation with information indicating an instruction forelectronically shredding.