Huang et al., 2018 - Google Patents
A survey of key management service in cloudHuang et al., 2018
- Document ID
- 13727694916186164930
- Author
- Huang X
- Chen R
- Publication year
- Publication venue
- 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS)
External Links
Snippet
Protect data in the cloud is becoming more and more important. Cryptographic keys are used to encrypt the data, so the key management is the paramount issue to persuade the website owners to save their data in the cloud. In this paper, we discuss the KMS (key …
- 235000010956 sodium stearoyl-2-lactylate 0 abstract description 23
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6968223B2 (en) | Methods, devices, and systems for quantum key distribution | |
US9026805B2 (en) | Key management using trusted platform modules | |
EP3089399B1 (en) | Methods and devices for securing keys for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management | |
US9716696B2 (en) | Encryption in the cloud using enterprise managed keys | |
Sanka et al. | Secure data access in cloud computing | |
Lampson et al. | Authentication in distributed systems: Theory and practice | |
Tysowski et al. | Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds | |
Hota et al. | Capability-based cryptographic data access control in cloud computing | |
JP6537455B2 (en) | Method, apparatus, computer program product, and cloud compute infrastructure (key management in multi-tenant environment) of key management in multi-tenant computing infrastructure | |
CN103795692B (en) | Open authorization method, system and certification authority server | |
Pradeep et al. | An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment | |
US7571467B1 (en) | System and method to package security credentials for later use | |
US11469903B2 (en) | Autonomous signing management operations for a key distribution service | |
CN103534976A (en) | Data security protection method, server, host, and system | |
US10931453B2 (en) | Distributed encryption keys for tokens in a cloud environment | |
CN111865609A (en) | Private cloud platform data encryption and decryption system based on state cryptographic algorithm | |
Huang et al. | A survey of key management service in cloud | |
KR102020357B1 (en) | Method for security communication in Network Functional Virtualization and System thereof | |
Buchade et al. | Key management for cloud data storage: methods and comparisons | |
US10887095B2 (en) | Allocating security parameter index values using time-based one-time passwords | |
Alangar | Cloud computing security and encryption | |
Kaviani et al. | Flock: A Framework for Deploying On-Demand Distributed Trust | |
US20240012933A1 (en) | Integration of identity access management infrastructure with zero-knowledge services | |
Chavan et al. | Efficient Attribute Based Encryption Outsourcing in Cloud Storage with User Revocation | |
Faraja et al. | Mediated IBC-Based Management System of Identity and Access in Cloud Computing |