Secure key management in cloud computing.
Mauri MartinWasim A. Al-HamdaniPublished in: InfoSecCD (2014)
Keyphrases
- cloud computing
- key management
- key management scheme
- ad hoc networks
- resource constrained
- data center
- wireless sensor networks
- key distribution
- computing resources
- secure communication
- service providers
- security protocols
- distributed computing
- data management
- security issues
- cloud computing environment
- identity based cryptography
- secret key
- end to end
- cloud storage
- secure manner
- fault tolerant
- key establishment
- cloud computing platform
- personal information
- cost effective
- lightweight