Abstract
Cloud computing from the last few years has grown from a promising business concept to one of the fastest growing segments of IT Enterprise. Because of the attractive features offered by cloud computing, many enterprises are using cloud storage for storing essential information. Like any other emerging technologies cloud computing also brings many new security challenges. Thus, numerous researches were done to ameliorate this problem by introducing effective key management solutions to secure the data stored in the cloud. This paper presents a comprehensive survey on the various key management techniques that can be adopted to provide effective security to the cloud-stored data. The primary focus of this survey is to highlight the issues and challenges involved in designing an effective key management solution for the cloud. We have also done a detailed analysis of thematic taxonomy on key derivation hierarchies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Atallah MJ, Blanton M, Fazio N, Frikken KB. Dynamic and efficient key management for access hierarchies. ACM Transactions on Information and System Security 2009; 12:18:1–43.
De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Pelosi G, Samarati P. Preserving confidentiality of security policies in data outsourcing. In: Proceedings of the seventh ACM workshop on privacy in the electronic society, WPES’ 08. New York, NY, USA: ACM; 2008. pp. 75–84.
Damiani E, di Vimercati SDC, Foresti S, Jajodia S, Paraboschi S, Samarati P. Key management for multi-user encrypted databases. In: Proceedings of the 2005 ACM workshop on storage security and survivability, StorageSS’ 05. New York, NY, USA: ACM; 2005. pp. 74–83.
Damiani E, di Vimercati SDC, Foresti S, Jajodia S, Paraboschi S, Samarati P. Key management for multi-user encrypted databases. In: Proceedings of the 2005 ACM workshop on storage security and survivability, StorageSS’ 05. New York, NY, USA: ACM; 2005. pp. 74–83.
W. Wang, Z. Li, R. Owens, B. Bhargava, Secure and efficient access to outsourced data, in: Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW’ 09, ACM, New York, NY, USA, 2009, pp. 55–66.
Blundo C, Cimato S, De Capitani di Vimercati S, De Santis A, Foresti S, Paraboschi S, et al. Efficient key management for enforcing access control in outsourced scenarios. In: Gritzalis D, Lopez J, editors. Emerging challenges for security, privacy and trust, IFIP advances in information and communication technology, 297. Boston: Springer; 2009. pp. 364–75.
Miao Zhou, Yi Mu, Willy Susilo, Jun Yan Liju Dong, Privacy enhanced data outsourcing in the cloud. In Journal of Network and Computer Applications 35 (2012) 1367–1373, Journal homepage: www.elsevier.com/locate/jnca.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ahamed Ali, S., Ramakrishnan, M., Duraipandian, N. (2019). A Comprehensive Analysis of Key Management Models in the Cloud: Design, Challenges, and Future Directions. In: Bhaskar, M., Dash, S., Das, S., Panigrahi, B. (eds) International Conference on Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 846. Springer, Singapore. https://doi.org/10.1007/978-981-13-2182-5_5
Download citation
DOI: https://doi.org/10.1007/978-981-13-2182-5_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2181-8
Online ISBN: 978-981-13-2182-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)