Key management infrastructure in cloud computing environment-a survey
Journal: ACCENTS Transactions on Information Security (TIS) (Vol.2, No. 7)Publication Date: 2017-07-29
Authors : Mohan Naik R; S V Sathyanarayana;
Page : 52-61
Keywords : Key management; Cloud computing; Infrastructure as a service (IaaS); Platform as a service (PaaS); Software as a service (SaaS).;
Abstract
The term cryptography which means “secret writing”, has become the foundation primitive in providing security for many communication applications. In many applications, particularly in group communication, there is a need to hide secret data like passwords, encryption key, recipes etc. Here efficient key management protocols are required to provide security for group's secret data. Because it is very challenging to provide security for group's secret data, especially in two scenarios: when the number of group members more and when the group members are present in different locations with diverse mechanisms of protection. The cloud computing where application services are provided through the internet. Cloud computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the internet. The cloud computing not only provides additional computing resources, but also network infrastructure which supports group communication scenarios. To interact with various services in the cloud and to store the data generated/processed by those services, several security mechanisms are required. In this context, this paper investigates the basic problem of cloud computing key management and enabling support for interoperability between cloud cryptographic clients and cloud key management servers. Cloud key management includes its creation and its subsequent adoption to reduce the complexity of encryption key management, infrastructure costs and risks and also to enhance the performance of both private and public storage cloud is discussed. This paper deals with the elaborate survey of existing key management techniques in cloud computing security and there by exploring the possible solution for cloud computing security.
Other Latest Articles
- Weighted threshold ECDSA for securing bitcoin wallet
- An efficient ID-based partially blind signature scheme and application in electronic-cash payment system
- A survey on security of mobile handheld devices through elliptic curve cryptography
- USE OF PSYCHOMETRICS IN ORGANISATION DEVELOPMENT
- Digital image forgery detection techniques: a survey
Last modified: 2017-03-15 15:55:51