{"title":"Secure key management in cloud computing","authors":"Maurice Martin, Wasim Alhamdani","doi":"10.1145/2670739.2670745","DOIUrl":null,"url":null,"abstract":"In this paper, we will discuss Secure Key Management in Cloud Computing. We discuss the basics of what a key is to how it is used in cloud computing. This paper looks at the types and states of a key. It is then followed by the cloud computing model and the overview of Secure Key Management. Data needs to be in plain text or decrypted for processing, and that requires access to the encryption key. In cloud environments, the data owner will often store the key in the cloud alongside the encrypted data for easy access. This practice creates a sizable security risk, since anybody with access to that particular cloud server can also access the encryption keys. Due to this we look at the weakness of Secure Key Management and the strategies used to contest those weaknesses.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2014 Information Security Curriculum Development Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2670739.2670745","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, we will discuss Secure Key Management in Cloud Computing. We discuss the basics of what a key is to how it is used in cloud computing. This paper looks at the types and states of a key. It is then followed by the cloud computing model and the overview of Secure Key Management. Data needs to be in plain text or decrypted for processing, and that requires access to the encryption key. In cloud environments, the data owner will often store the key in the cloud alongside the encrypted data for easy access. This practice creates a sizable security risk, since anybody with access to that particular cloud server can also access the encryption keys. Due to this we look at the weakness of Secure Key Management and the strategies used to contest those weaknesses.