Key Management as a Service

Liran Lerman, Olivier Markowitch, Jorge Nakahara Jr

2012

Abstract

In this paper we consider the security issues related to the key management in cloud computing. We focus on the difficulty of managing cryptographic keys necessary to maintain for example the confidentiality of information stored in the clouds. In this framework, we present a threshold cryptosystem as well as three protocols, based on cooperation between cloud providers and a random number generator which is a trusted third party, that covers the issue of key management.

Download


Paper Citation


in Harvard Style

Lerman L., Markowitch O. and Nakahara Jr J. (2012). Key Management as a Service . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 276-281. DOI: 10.5220/0004071102760281

in Bibtex Style

@conference{secrypt12,
author={Liran Lerman and Olivier Markowitch and Jorge Nakahara Jr},
title={Key Management as a Service},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={276-281},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004071102760281},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Key Management as a Service
SN - 978-989-8565-24-2
AU - Lerman L.
AU - Markowitch O.
AU - Nakahara Jr J.
PY - 2012
SP - 276
EP - 281
DO - 10.5220/0004071102760281