[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Huang et al., 2018 - Google Patents

A survey of key management service in cloud

Huang et al., 2018

Document ID
13727694916186164930
Author
Huang X
Chen R
Publication year
Publication venue
2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS)

External Links

Snippet

Protect data in the cloud is becoming more and more important. Cryptographic keys are used to encrypt the data, so the key management is the paramount issue to persuade the website owners to save their data in the cloud. In this paper, we discuss the KMS (key …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Similar Documents

Publication Publication Date Title
JP6968223B2 (en) Methods, devices, and systems for quantum key distribution
US9026805B2 (en) Key management using trusted platform modules
EP3089399B1 (en) Methods and devices for securing keys for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management
US9716696B2 (en) Encryption in the cloud using enterprise managed keys
Sanka et al. Secure data access in cloud computing
Lampson et al. Authentication in distributed systems: Theory and practice
Tysowski et al. Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds
Hota et al. Capability-based cryptographic data access control in cloud computing
JP6537455B2 (en) Method, apparatus, computer program product, and cloud compute infrastructure (key management in multi-tenant environment) of key management in multi-tenant computing infrastructure
CN103795692B (en) Open authorization method, system and certification authority server
Pradeep et al. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
US7571467B1 (en) System and method to package security credentials for later use
US11469903B2 (en) Autonomous signing management operations for a key distribution service
CN103534976A (en) Data security protection method, server, host, and system
US10931453B2 (en) Distributed encryption keys for tokens in a cloud environment
CN111865609A (en) Private cloud platform data encryption and decryption system based on state cryptographic algorithm
Huang et al. A survey of key management service in cloud
KR102020357B1 (en) Method for security communication in Network Functional Virtualization and System thereof
Buchade et al. Key management for cloud data storage: methods and comparisons
US10887095B2 (en) Allocating security parameter index values using time-based one-time passwords
Alangar Cloud computing security and encryption
Kaviani et al. Flock: A Framework for Deploying On-Demand Distributed Trust
US20240012933A1 (en) Integration of identity access management infrastructure with zero-knowledge services
Chavan et al. Efficient Attribute Based Encryption Outsourcing in Cloud Storage with User Revocation
Faraja et al. Mediated IBC-Based Management System of Identity and Access in Cloud Computing