Securing Cryptographic Keys in the Cloud: A Survey.
Bushra AlBelooshiErnesto DamianiKhaled SalahThomas MartinPublished in: IEEE Cloud Comput. (2016)
Keyphrases
- hash functions
- cloud computing
- smart card
- high assurance
- secret key
- information security
- identity management
- virtual machine
- similarity search
- data center
- key management
- databases
- security protocols
- s box
- access control
- service providers
- encryption scheme
- computing platform
- security analysis
- security properties
- encryption key