Encryption key management as a trusted security as a service for cloud computing.
Saad FehisOmar NoualiMohand Tahar KechadiPublished in: Int. J. Secur. Networks (2021)
Keyphrases
- key management
- cloud computing
- service providers
- remote attestation
- security services
- security protocols
- trusted computing
- network access
- cloud services
- key management scheme
- wireless sensor networks
- ad hoc networks
- resource constrained
- data center
- cloud computing environment
- identity based cryptography
- key distribution
- secret key
- digital signature
- data management
- software as a service
- encryption decryption
- elliptic curve
- cloud storage
- security issues
- distributed computing
- web services
- data privacy
- computing platform
- computing environments
- metadata
- sensor networks
- distributed systems
- public key cryptography
- virtual machine
- authentication protocol
- databases