DocumentCode
123315
Title
Key Management for Cloud Data Storage: Methods and Comparisons
Author
Buchade, Amar Ramesh ; Ingle, Rajesh
Author_Institution
Dept. of Comput. Eng., Coll. of Eng., Pune, India
fYear
2014
fDate
8-9 Feb. 2014
Firstpage
263
Lastpage
270
Abstract
Cloud computing paradigm is being used because of its low up-front cost. In recent years, even mobile phone users store their data at Cloud. Customer information stored at Cloud needs to be protected against potential intruders as well as cloud service provider. There is threat to the data in transit and data at cloud due to different possible attacks. Organizations are transferring important information to the Cloud that increases concern over security of data. Cryptography is common approach to protect the sensitive information in Cloud. Cryptography involves managing encryption and decryption keys. In this paper, we compare key management methods, apply key management methods to various cloud environments and analyze symmetric key cryptography algorithms.
Keywords
cloud computing; cryptography; storage management; cloud computing paradigm; cloud data storage; cloud service provider; data security; decryption key management; encryption key management; potential intruders; sensitive information protection; symmetric key cryptography algorithms; Cloud computing; Communities; Memory; Organizations; Public key; Servers; Key management; applications; cloud scenarios; onsite cloud; outsourced cloud; public cloud; symmetric key;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Computing & Communication Technologies (ACCT), 2014 Fourth International Conference on
Conference_Location
Rohtak
Type
conf
DOI
10.1109/ACCT.2014.78
Filename
6783462
Link To Document