A Trusted Way for Encryption Key Management in Cloud Computing

Files in This Item:
File Description SizeFormat 
insight_publication.pdf348.57 kBAdobe PDFDownload
Title: A Trusted Way for Encryption Key Management in Cloud Computing
Authors: Fehis, Saad
Nouali, Omar
Kechadi, Tahar
Permanent link: http://hdl.handle.net/10197/9655
Date: 12-Nov-2017
Online since: 2019-03-22T09:38:02Z
Abstract: We propose an approach to provide the cryptography key management system (CKMS) as a trusted security services in Cloud Computing, based on the trusted platform module (TPM / vTPM). In this approach we have used the TPMs capabilities / functions as a secure way and a root of trust for this kind of services. Therefore, and as an application case, we have used TPMs key generation component as a trusted way to generate and to sign an encryption/signing keys by the CKMS for their customers.Index Terms Cloud Computing, Security as a Services, Cryptographic Key Management System, Trusted Platform.
Funding Details: Science Foundation Ireland
Type of material: Conference Publication
Publisher: Springer
Start page: 302
End page: 314
Series/Report no.: Lecture Notes in Networks and Systems book series (LNNS, volume 25)
Copyright (published version): 2018 Springer
Keywords: Cloud computingSecurity as a serviceCryptographic key management systemTrusted platform
DOI: 10.1007/978-3-319-69137-4_27
Other versions: http://conf2017.ait2s.com/
Language: en
Status of Item: Peer reviewed
Is part of: Ezziyyani, M., Bahaj, M., Khoukhi, F. (eds.). Proceedings of the International Conference on Advanced Information Technology, Services and Systems (AIT2S-17) Held on April 14/15, 2017 in Tangier
Conference Details: International Conference on Advanced Information Technology, Services and Systems (AIT2S) 2017, Tangier, Morocco, 14-15 April 2017
Appears in Collections:Insight Research Collection

Show full item record

Google ScholarTM



This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.