SlideShare a Scribd company logo
1 of 5
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
42
Brief Analysis of Methods for Cloud Computing Key
Management
Sneha Soni
Sagar Institute of Research & Technology –Excellence, Ayoudha by Pass Road, Bhopal
Tel: +91 9907096956 E-mail: soni.snehaa@gmail.com
Amit Soni
Saroginin Naidu Govt Girls PG (Autonomous) College, Near 7 Number Stop, Bhopal
Tel: +91 9893448577 E-mail: stoneuntitled@yahoo.com
Abstract
In this paper basic of cloud and possible methods for its key management is discussed. Now a days cloud
computing is good arena in the field of research. In cloud computing cloud customer and cloud provider needs
to secure data against loss and theft. Encryption with key management is a technique for securing the personal
and enterprise data. It is mainly used to protect data. In this paper how key management can be performed to
protect cloud data is discussed. So that risks of data loss and theft can be reduced.
Keywords: Cloud computing, Cloud architecture, Encryption, Key management
1. Cloud Computing and Its Architecture
Cloud computing is a new business model. It is a way of delivering computing resources, Cloud computing
is not a new technology. Cloud computing is a model for enabling convenient, on-demand network access to a
shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that
can be rapidly provisioned and released with minimal management effort or service provider interaction.
If we think about the why cloud computing is needed then there are N number of reason, it does not require
any software or hardware to install, cloud computing is equipped with dynamic allocation, pay per uses, platform
independent, massive , web scale abstracted infrastructure and no long term commitments.
Characteristics of cloud computing is as follows:
It uses virtualization systems, which will reduces hardware cost and there maintenances, it also provide on
demand self service, scaling feature on the basis of demand, it also include storage devices, memory, processing
units and networks for communication. It also provides automatic control monitoring of resources and
optimization, it can access in heterogeneous plateforms, change back, show back and metering back features.
The cloud computing has three basic deployment model named as Private cloud, Public and Hybrid Cloud,
let’s see what they are Private cloud plateform is used on individual need basis. In this service model business
essential is turn into information technology environment and uses it to deliver service to their uses. It provides
virtualization, multi-tenancy, consistent deployment; change back, pricing and security and access control.
Public cloud : In this serive model a business rents the capability and businessman or any client will
pay for what they use on demand. This plateform is avaiable to public users . any public user can register in it
and can enjoy the service of avaiable infrastructure. Public cloud is the most taggated area for malicious users. In
this cloud nothing is avaiable as free of cost, its vendors providean access control mechanism for their uses. It is
avaiable through third party service provider. It shows the cloud features i.e. pay per uses and on demand uses.
Hybrid cloud: It combines the elements of the public and private clouds. It is the extension of both the
clouds. In hybrid cloud user can keep control on data and business- critical services by simultaneously
outsourcining non-business–critical information and cloud process. It offer advantages of both the public and
private clouds i.e scale and conveniences of public cloud, control and realibility of on premises software and
infrastructure.
There are three types of cloud service model i.e IaaS, PaaS, Saas let’s see what does it mean, IaaS is
Infrastructure-as-a-service, it provides access to computation resources , network, hardware, or virtual computers
which enable an internet based services. It uses the concept of the virtualization, one of the example Amazon
EC2.
PaaS is platform-as-a-service, it provide provisioning of hardware and operating system. With the help of
PaaS support customer writes custom application. Where cloud providers deliver platforms, tools and other
business services that enable customers to develop, deploy, and manage their own applications, without
installing any of these platforms or support tools on their local machines. The PaaS Model is hosted on top cloud
infrastructures directly. Mostly used PaaS are Google Apps and Microsoft Windows Azure.
SaaS is Software-as-a-service (SaaS), hosting of the cloud providers applications on the cloud infrastructure
is done. End users are internet based service user. Application installation is not needed at the customer
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
43
computers. It is hosted on top of PaaS, IaaS or can directly host on cloud infrastructure. Various examples of the
SaaS include customer relationship managements, management information systems, human resource
management and many more.
2. The Cloud Computing Key Management
Key management is a huge, complex issue now in the land of cloud computing. Encrytion is generally used
technique for implementing ckey management . now a days encyption is universally recognized method to
protect data .
Management of cloud comuting along with the key management is very complex issue. In public cloud
particularly in IaaS, it is an complex task to implement because it has most of the pitfalls . if we think about the
key management then the biggest point that needs to be consider is not that how encryption is implemented but
main issue is the requirement of the ownership of the key. Also one other point to be noted is that where to keep
the encryption key either in cloud infrastructure or in customer premise.
Security is one of the main problem in cloud computing structure. Cloud service providers perform task for
monitor the cloud and data usage. In this Users end is not responsible for maintaining back end data storages
and its exact storage location. Security of this user end data can be ensure by implementing key management.
Various key management interoperability protocols are used to ensure effective ness of the key
management. enabling encryption on the virtual machine is challenging task because it is not possible to encrypt
everything. Use of virtual machine increases the amount of the data, its working is not same as the physical
machine.
Cloud customer is only responsible for maintaining key management . Key provisioning and storage is not
mainatained by them. Virtual machines generally stores key. There are various stages for key management i.e.
generating keys, using keys, storing keys, distributing keys revoking keys, verifying keys and destroying keys,
some of the assumption are two basic scenarios.
Major issue that comes in key management is key geeneration and key application, security of the keys and
master key, failure recovery, key expirationand key uses. , there is poor integeration between key management
systems and application of the encryption and data lifecycle.
3. Methods for Cloud Key Management
Description of each method is as follows.
3.1 First methods
In this method, encryption is provided by the cloud provider. Cloud provider plays an important role for
providing security of data. It kept customer encryption keys. Virtual wall is created around cloud data so that
data can be protect from threats. With the help of encryption plain and sensitive data transforms to protected
format. Whenever data is transfer from one place to another place it is protected by cloud provider encryption.
When encryption is performed in the cloud database two important aspects is need to remember first is
separation between data, what data is used in the cloud and what data needs to be secured. Second is who the
authorized person is who can access and control data. What data is sensitive and what data is encrypted.
As far as sensitivity of the data is concerned i.e. social security numbers, account number, patient
healthcare records, etc. can be consider. Cloud provider encrypts data when it is stored in databases or
transferred through a web browser. Overall encryption is under the control of the cloud service provider and it is
not segmented by the customer.
Only authorized users and organization with access to right cryptographic keys, can access that data.
Accessing permission of reading and writing is also given by the cloud provider. By implementing this type of
method cloud data and backup tape cannot hacks by unauthorized user.
This method can be assured when taking care of these points and doing practice securely storing of the
encryption key. Distribution of keys on requirement basis, selection and use of encryption algorithm,
management of the key lifecycle, and maintenance of access privileges, proper documentation of status of key
management and encryption. With the help of such habits greater security can be maintained regardless of who is
the owner of cloud infrastructure and what is its location.
3.2 Second method
The second method involves trust on third party with user encryption keys. In this method your trust on
third party is the base for assuring security of the cloud database. The major disadvantage of this method is that it
is mostly targeted method for hacker.
3.3 Third method
The third method includes implementation of key management server in the physically located data center.
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
44
4. Pros and Cons of the Methods
In section III we have briefly discussed the possible approach for key management in cloud computing
environment, let’s see the basic advantage and the disadvantage of the approaches. First method is easy to deploy
and manage because very comfortably it integrates layers of cloud data. But it is very costly to implement.
Second method is not very secure if third party is not reliable then your key can be disclose. But overhead
of the customer is reduced because now customer is not responsible for maintaining key management and other
aspect of the clouds computing.
Third method without a doubt is secure, but it eradicates various advantages of the cloud. It also forces
customer to reverse back to data center where you have stored your data.
Conclusion
After briefly discussion of key management methods in cloud computing we can conclude that for
ensuring cloud computing data security it is up to the cloud customer an d cloud service provider that which
methods is suitable for them by analyzing advantages and disadvantages of each method. As future work is
concerned we can do research for developing cloud key management protocols that can overcome cons of above
discussed methods at certain level.
References
Dr. Kumar Saurabh (2012) technical book on “ Cloud Computing “ second edition, Wiley – India Publication,
June.
Xin Yang, Qingni Shen , Yahui Yang and Sihan Qing (2011) ,” A way of key management in cloud
storage based on trusted computing”, NPC'11 Proceedings of the 8th IFIP international conference on Network
and parallel computing, ACM Digital Library, 2011, pp.135-145.
Sun Lei, Dai Zishan and Guo Jindi (2010) on “Research on key management infrastructure in cloud computing
environment“, IEEE 2010, Grid and Cooperative Computing (GCC) International Conference, pp. 404- 407.
Notes
Figure 1. Cloud Computing Architecture
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
45
Figure 2. Cloud Computing Key Management
Figure 3. Cloud Computing Key Management Working
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/Journals/
The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

More Related Content

Viewers also liked

Le temps partiel, une réserve d’emplois ?
Le temps partiel, une réserve d’emplois ?Le temps partiel, une réserve d’emplois ?
Le temps partiel, une réserve d’emplois ?France Stratégie
 
Branding islamic spiritual tourism an exploratory study in australia & pakistan
Branding islamic spiritual tourism an exploratory study in australia & pakistanBranding islamic spiritual tourism an exploratory study in australia & pakistan
Branding islamic spiritual tourism an exploratory study in australia & pakistanAlexander Decker
 
The Mediabrain - the impact of the reader-magazine relationship proven by bra...
The Mediabrain - the impact of the reader-magazine relationship proven by bra...The Mediabrain - the impact of the reader-magazine relationship proven by bra...
The Mediabrain - the impact of the reader-magazine relationship proven by bra...Researchblog
 
вијенац рекапитулација
вијенац рекапитулацијавијенац рекапитулација
вијенац рекапитулацијаmilijana1
 
припрема за писмени
припрема за писмениприпрема за писмени
припрема за писмениmilijana1
 
глаголски облици 8
глаголски облици 8глаголски облици 8
глаголски облици 8milijana1
 
синтагме
синтагмесинтагме
синтагмеmilijana1
 
Gl prilog sadasnji
Gl prilog sadasnjiGl prilog sadasnji
Gl prilog sadasnjimilijana1
 
гласовне промене
гласовне променегласовне промене
гласовне променеmilijana1
 
зависне реченице
зависне реченицезависне реченице
зависне реченицеmilijana1
 
твроба речи подела гласова припрема за тест
твроба речи подела гласова припрема за тесттвроба речи подела гласова припрема за тест
твроба речи подела гласова припрема за тестmilijana1
 

Viewers also liked (12)

Le temps partiel, une réserve d’emplois ?
Le temps partiel, une réserve d’emplois ?Le temps partiel, une réserve d’emplois ?
Le temps partiel, une réserve d’emplois ?
 
Branding islamic spiritual tourism an exploratory study in australia & pakistan
Branding islamic spiritual tourism an exploratory study in australia & pakistanBranding islamic spiritual tourism an exploratory study in australia & pakistan
Branding islamic spiritual tourism an exploratory study in australia & pakistan
 
The Mediabrain - the impact of the reader-magazine relationship proven by bra...
The Mediabrain - the impact of the reader-magazine relationship proven by bra...The Mediabrain - the impact of the reader-magazine relationship proven by bra...
The Mediabrain - the impact of the reader-magazine relationship proven by bra...
 
вијенац рекапитулација
вијенац рекапитулацијавијенац рекапитулација
вијенац рекапитулација
 
припрема за писмени
припрема за писмениприпрема за писмени
припрема за писмени
 
вук
вуквук
вук
 
глаголски облици 8
глаголски облици 8глаголски облици 8
глаголски облици 8
 
синтагме
синтагмесинтагме
синтагме
 
Gl prilog sadasnji
Gl prilog sadasnjiGl prilog sadasnji
Gl prilog sadasnji
 
гласовне промене
гласовне променегласовне промене
гласовне промене
 
зависне реченице
зависне реченицезависне реченице
зависне реченице
 
твроба речи подела гласова припрема за тест
твроба речи подела гласова припрема за тесттвроба речи подела гласова припрема за тест
твроба речи подела гласова припрема за тест
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Brief analysis of methods for cloud computing key management

  • 1. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 42 Brief Analysis of Methods for Cloud Computing Key Management Sneha Soni Sagar Institute of Research & Technology –Excellence, Ayoudha by Pass Road, Bhopal Tel: +91 9907096956 E-mail: soni.snehaa@gmail.com Amit Soni Saroginin Naidu Govt Girls PG (Autonomous) College, Near 7 Number Stop, Bhopal Tel: +91 9893448577 E-mail: stoneuntitled@yahoo.com Abstract In this paper basic of cloud and possible methods for its key management is discussed. Now a days cloud computing is good arena in the field of research. In cloud computing cloud customer and cloud provider needs to secure data against loss and theft. Encryption with key management is a technique for securing the personal and enterprise data. It is mainly used to protect data. In this paper how key management can be performed to protect cloud data is discussed. So that risks of data loss and theft can be reduced. Keywords: Cloud computing, Cloud architecture, Encryption, Key management 1. Cloud Computing and Its Architecture Cloud computing is a new business model. It is a way of delivering computing resources, Cloud computing is not a new technology. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. If we think about the why cloud computing is needed then there are N number of reason, it does not require any software or hardware to install, cloud computing is equipped with dynamic allocation, pay per uses, platform independent, massive , web scale abstracted infrastructure and no long term commitments. Characteristics of cloud computing is as follows: It uses virtualization systems, which will reduces hardware cost and there maintenances, it also provide on demand self service, scaling feature on the basis of demand, it also include storage devices, memory, processing units and networks for communication. It also provides automatic control monitoring of resources and optimization, it can access in heterogeneous plateforms, change back, show back and metering back features. The cloud computing has three basic deployment model named as Private cloud, Public and Hybrid Cloud, let’s see what they are Private cloud plateform is used on individual need basis. In this service model business essential is turn into information technology environment and uses it to deliver service to their uses. It provides virtualization, multi-tenancy, consistent deployment; change back, pricing and security and access control. Public cloud : In this serive model a business rents the capability and businessman or any client will pay for what they use on demand. This plateform is avaiable to public users . any public user can register in it and can enjoy the service of avaiable infrastructure. Public cloud is the most taggated area for malicious users. In this cloud nothing is avaiable as free of cost, its vendors providean access control mechanism for their uses. It is avaiable through third party service provider. It shows the cloud features i.e. pay per uses and on demand uses. Hybrid cloud: It combines the elements of the public and private clouds. It is the extension of both the clouds. In hybrid cloud user can keep control on data and business- critical services by simultaneously outsourcining non-business–critical information and cloud process. It offer advantages of both the public and private clouds i.e scale and conveniences of public cloud, control and realibility of on premises software and infrastructure. There are three types of cloud service model i.e IaaS, PaaS, Saas let’s see what does it mean, IaaS is Infrastructure-as-a-service, it provides access to computation resources , network, hardware, or virtual computers which enable an internet based services. It uses the concept of the virtualization, one of the example Amazon EC2. PaaS is platform-as-a-service, it provide provisioning of hardware and operating system. With the help of PaaS support customer writes custom application. Where cloud providers deliver platforms, tools and other business services that enable customers to develop, deploy, and manage their own applications, without installing any of these platforms or support tools on their local machines. The PaaS Model is hosted on top cloud infrastructures directly. Mostly used PaaS are Google Apps and Microsoft Windows Azure. SaaS is Software-as-a-service (SaaS), hosting of the cloud providers applications on the cloud infrastructure is done. End users are internet based service user. Application installation is not needed at the customer
  • 2. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 43 computers. It is hosted on top of PaaS, IaaS or can directly host on cloud infrastructure. Various examples of the SaaS include customer relationship managements, management information systems, human resource management and many more. 2. The Cloud Computing Key Management Key management is a huge, complex issue now in the land of cloud computing. Encrytion is generally used technique for implementing ckey management . now a days encyption is universally recognized method to protect data . Management of cloud comuting along with the key management is very complex issue. In public cloud particularly in IaaS, it is an complex task to implement because it has most of the pitfalls . if we think about the key management then the biggest point that needs to be consider is not that how encryption is implemented but main issue is the requirement of the ownership of the key. Also one other point to be noted is that where to keep the encryption key either in cloud infrastructure or in customer premise. Security is one of the main problem in cloud computing structure. Cloud service providers perform task for monitor the cloud and data usage. In this Users end is not responsible for maintaining back end data storages and its exact storage location. Security of this user end data can be ensure by implementing key management. Various key management interoperability protocols are used to ensure effective ness of the key management. enabling encryption on the virtual machine is challenging task because it is not possible to encrypt everything. Use of virtual machine increases the amount of the data, its working is not same as the physical machine. Cloud customer is only responsible for maintaining key management . Key provisioning and storage is not mainatained by them. Virtual machines generally stores key. There are various stages for key management i.e. generating keys, using keys, storing keys, distributing keys revoking keys, verifying keys and destroying keys, some of the assumption are two basic scenarios. Major issue that comes in key management is key geeneration and key application, security of the keys and master key, failure recovery, key expirationand key uses. , there is poor integeration between key management systems and application of the encryption and data lifecycle. 3. Methods for Cloud Key Management Description of each method is as follows. 3.1 First methods In this method, encryption is provided by the cloud provider. Cloud provider plays an important role for providing security of data. It kept customer encryption keys. Virtual wall is created around cloud data so that data can be protect from threats. With the help of encryption plain and sensitive data transforms to protected format. Whenever data is transfer from one place to another place it is protected by cloud provider encryption. When encryption is performed in the cloud database two important aspects is need to remember first is separation between data, what data is used in the cloud and what data needs to be secured. Second is who the authorized person is who can access and control data. What data is sensitive and what data is encrypted. As far as sensitivity of the data is concerned i.e. social security numbers, account number, patient healthcare records, etc. can be consider. Cloud provider encrypts data when it is stored in databases or transferred through a web browser. Overall encryption is under the control of the cloud service provider and it is not segmented by the customer. Only authorized users and organization with access to right cryptographic keys, can access that data. Accessing permission of reading and writing is also given by the cloud provider. By implementing this type of method cloud data and backup tape cannot hacks by unauthorized user. This method can be assured when taking care of these points and doing practice securely storing of the encryption key. Distribution of keys on requirement basis, selection and use of encryption algorithm, management of the key lifecycle, and maintenance of access privileges, proper documentation of status of key management and encryption. With the help of such habits greater security can be maintained regardless of who is the owner of cloud infrastructure and what is its location. 3.2 Second method The second method involves trust on third party with user encryption keys. In this method your trust on third party is the base for assuring security of the cloud database. The major disadvantage of this method is that it is mostly targeted method for hacker. 3.3 Third method The third method includes implementation of key management server in the physically located data center.
  • 3. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 44 4. Pros and Cons of the Methods In section III we have briefly discussed the possible approach for key management in cloud computing environment, let’s see the basic advantage and the disadvantage of the approaches. First method is easy to deploy and manage because very comfortably it integrates layers of cloud data. But it is very costly to implement. Second method is not very secure if third party is not reliable then your key can be disclose. But overhead of the customer is reduced because now customer is not responsible for maintaining key management and other aspect of the clouds computing. Third method without a doubt is secure, but it eradicates various advantages of the cloud. It also forces customer to reverse back to data center where you have stored your data. Conclusion After briefly discussion of key management methods in cloud computing we can conclude that for ensuring cloud computing data security it is up to the cloud customer an d cloud service provider that which methods is suitable for them by analyzing advantages and disadvantages of each method. As future work is concerned we can do research for developing cloud key management protocols that can overcome cons of above discussed methods at certain level. References Dr. Kumar Saurabh (2012) technical book on “ Cloud Computing “ second edition, Wiley – India Publication, June. Xin Yang, Qingni Shen , Yahui Yang and Sihan Qing (2011) ,” A way of key management in cloud storage based on trusted computing”, NPC'11 Proceedings of the 8th IFIP international conference on Network and parallel computing, ACM Digital Library, 2011, pp.135-145. Sun Lei, Dai Zishan and Guo Jindi (2010) on “Research on key management infrastructure in cloud computing environment“, IEEE 2010, Grid and Cooperative Computing (GCC) International Conference, pp. 404- 407. Notes Figure 1. Cloud Computing Architecture
  • 4. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 45 Figure 2. Cloud Computing Key Management Figure 3. Cloud Computing Key Management Working
  • 5. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar