Visible to the public Key Management for Cloud Data Storage: Methods and Comparisons

TitleKey Management for Cloud Data Storage: Methods and Comparisons
Publication TypeConference Paper
Year of Publication2014
AuthorsBuchade, A.R., Ingle, R.
Conference NameAdvanced Computing Communication Technologies (ACCT), 2014 Fourth International Conference on
Date PublishedFeb
Keywordsapplications, cloud computing, cloud computing paradigm, cloud data storage, cloud scenarios, cloud service provider, Communities, cryptography, Data security, decryption key management, encryption key management, Key Management, Memory, onsite cloud, Organizations, outsourced cloud, potential intruders, public cloud, Public key, sensitive information protection, Servers, storage management, symmetric key, symmetric key cryptography algorithms
Abstract

Cloud computing paradigm is being used because of its low up-front cost. In recent years, even mobile phone users store their data at Cloud. Customer information stored at Cloud needs to be protected against potential intruders as well as cloud service provider. There is threat to the data in transit and data at cloud due to different possible attacks. Organizations are transferring important information to the Cloud that increases concern over security of data. Cryptography is common approach to protect the sensitive information in Cloud. Cryptography involves managing encryption and decryption keys. In this paper, we compare key management methods, apply key management methods to various cloud environments and analyze symmetric key cryptography algorithms.

URLhttp://ieeexplore.ieee.org/document/6783462/
DOI10.1109/ACCT.2014.78
Citation Key6783462