Opportunities in Using a Secure Element to Increase Confidence in Cloud Security Monitoring.
Teemu KanstrénSami LehtonenHilkka KukkohoviPublished in: CLOUD (2015)
Keyphrases
- security issues
- security requirements
- cloud computing
- security level
- security measures
- cloud storage
- security mechanisms
- security protocols
- security management
- key management
- security properties
- information security
- key agreement protocol
- authentication protocol
- security architecture
- identity management
- security analysis
- trusted computing
- stream cipher
- data encryption
- user authentication
- security services
- key exchange protocol
- monitoring system
- diffie hellman
- electronic voting
- integrity verification
- security patterns
- access control
- key agreement
- authentication mechanism
- intrusion detection
- previously mentioned
- cloud computing environment
- high security
- data security
- sensitive data
- situational awareness
- cryptographic protocols
- smart card
- encryption scheme
- key exchange
- public key encryption
- digital signature scheme
- secure communication
- data center
- provably secure
- network security
- authentication scheme
- electronic payment
- security policies
- key distribution
- cloud services
- secure routing
- key management scheme
- operating system
- digital rights management
- secure multiparty computation
- secret key