Home > Projects/Reports > Key Management in Cloud Computing

Key Management in Cloud Computing

Key Management (Distribution)

Key management belongs to set a string of bits which is the method used for subjoining an integrity to a key and the formation, evaluation and invalidating such keys. The purpose of transferring keys is to allow the server to communicate quietly to the cloud and any other server, using the common string of bits .Solution of this problem must follow these steps:

  1. 1 The key which server and cloud are sharing cannot be transferred in open. . Either it must be enciphered when sent, or server and cloud must derive it without an exchange of data from which the key can be derived. (Server and cloud can exchange data, but a third party cannot derive the key from the data exchanged.)
  2. server and cloud may trust a third person.
  3. The method of working and coding of string must be known to public. The only secret data must be involved string bits.

Key Management in Cloud Computing

Other then changing data key management maintains anything that belongs to a key and covers the formation/deformation, communicating of keys, storing of keys etc. Most cloud service providers provide common key formatting schemes for saving data or leave it on consumer’s choice. Both formation and management are important to help saving data and applications in the cloud. Especially now a days there is must cloud provider do that is to try a different management plan for their services. However there are still some problems effecting cloud computing. There are three requirements of efficient key management are as follow:

  • Secure Key Stores: The key must safe themselves from corrupt users. If a corrupt person gains hold of the keys, he will then be able to access any formatted data the key is connected to. Hence the key must be kept in storage, in transit and on backup media.
  • Access To Key Stores: Access to the key stores should be limited to the users that have the rights to access data. Difference of roles should be used to help control access. The entity that uses a given key should not be the entity that stores the key.
  • Key Backup And Recover-ability: Keys need secure backup and recovery solutions. Loss of keys, although helpful for disconnecting access to data, can be highly problematic to a business and Cloud providers need to confirm that keys aren’t lost through backup and recovery methods.

Tim Mather says that key management in establishments today are broken and that key management in the Cloud is a declined model that is neither effective nor adaptable. What cloud computing needs are standards? Fortunately, there are a number of standards of key management in the Cloud and is briefly defined below.

  • OASIS Key Management Interoperability Protocol (KMIP): Used to define a single, meaningful protocol for communication between formatted systems and establishment key management systems. KMIP is becoming a widely accepted standard in industry and are looking to adopt it within their enterprises working methods.
  • NIST SP 800-57: Provides basic guidelines on key management, the specific types of formation schemes and protection requirements as well as information of key recovery
  • IEEE 1619.3 Key Management: Covers storage formation and key management mainly for Iasi storage .The method has been stopped since December 2010.
  • ISO/IEC 11770-5:2011: Describes key establishment method for multiple sites to provide procedures for controlling cryptographic keys used in symmetric and asymmetric encryption algorithms.

You may also study:

The Effect of Cloud Computing on Network Management

Cloud Architecture Implementation at Metasoft Solutions

Related Posts

Leave a Comment

20 − 9 =