Key management infrastructure in cloud computing environment-a survey

The term cryptography which means “secret writing”, has become the foundation primitive in providing security for many communication applications. In many applications, particularly in group communication, there is a need to hide secret data like passwords, encryption key, recipes etc. Here efficient key management protocols are required to provide security for group’s secret data. Because it is very challenging to provide security for group’s secret data, especially in two scenarios: when the number of group members more and when the group members are present in different locations with diverse mechanisms of protection. The cloud computing where application services are provided through the internet. Cloud computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the internet. The cloud computing not only provides additional computing resources, but also network infrastructure which supports group communication scenarios. To interact with various services in the cloud and to store the data generated/processed by those services, several security mechanisms are required. In this context, this paper investigates the basic problem of cloud computing key management and enabling support for interoperability between cloud cryptographic clients and cloud key management servers. Cloud key management includes its creation and its subsequent adoption to reduce the complexity of encryption key management, infrastructure costs and risks and also to enhance the performance of both private and public storage cloud is discussed. This paper deals with the elaborate survey of existing key management techniques in cloud computing security and there by exploring the possible solution for cloud computing

[1]  Young Sil Lee,et al.  PKI-based cryptography for secure cloud data storage using ECC , 2014, 2014 International Conference on Information and Communication Technology Convergence (ICTC).

[2]  R. S. Shaji,et al.  Security in data forwarding through elliptic curve cryptography in cloud , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[3]  Sun Lei,et al.  Research on Key Management Infrastructure in Cloud Computing Environment , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.

[4]  Yueyun Chen,et al.  Novel hyper-combined public key based cloud storage key management scheme , 2014, China Communications.

[5]  Vinod Kumar,et al.  Secured user's authentication and private data storage- access scheme in cloud computing using Elliptic curve cryptography , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).

[6]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[7]  Ivan Damgård,et al.  Secure Key Management in the Cloud , 2013, IMACC.

[8]  Putchong Uthayopas,et al.  Performance improvement of cloud storage using a genetic algorithm based placement , 2011, 2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE).

[9]  Ching-Nung Yang,et al.  Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing , 2013, 2013 International Symposium on Biometrics and Security Technologies.

[10]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[11]  Rajashri Khanai,et al.  Addressing mobile Cloud Computing security issues: A survey , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[12]  Xinwen Zhang,et al.  Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing , 2011, CCS '11.

[13]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[14]  Ramaswamy Chandramouli,et al.  Cryptographic Key Management Issues and Challenges in Cloud Services , 2014, Secure Cloud Computing.

[15]  I. S. Shalini,et al.  A comparative analysis of Secret Sharing Schemes with special reference to e-commerce applications , 2015, 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT).

[16]  Sahil,et al.  Artificial intelligence for designing user profiling system for cloud computing security: Experiment , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[17]  N. Jenefa,et al.  A Cloud Storage System with Data Confidentiality and Data Forwarding , 2013 .

[18]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[19]  O. Pandithurai,et al.  A novel method to secure cloud computing through multicast key management , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).