Securing Cryptographic Keys in the Cloud: A Survey

Bushra Albelooshi, Ernesto Damiani, Khaled Salah, Thomas Martin

Research output: Contribution to specialist publicationArticle

12 Scopus citations

Abstract

Public cloud users are increasingly interested in securing their data and network traffic by using outsourced encryption or decryption services (cryptography as a service). However, many concerns have been raised about trusting the outsourced service's memory with sensitive information like the user's cryptographic keys. This survey reviews techniques for securing data owners' cryptographic keys in a public cloud, preserving them from any inquisitive actions on the part of cotenants (fellow data owners, domain administrators, or other third parties) and the cloud provider itself. The aim is to provide readers with a comparative in-depth analysis of available techniques and point to open research problems.

Original languageBritish English
Pages42-56
Number of pages15
Volume3
No4
Specialist publicationIEEE Cloud Computing
DOIs
StatePublished - 2016

Keywords

  • cloud computing
  • cryptography
  • security
  • Survey

Fingerprint

Dive into the research topics of 'Securing Cryptographic Keys in the Cloud: A Survey'. Together they form a unique fingerprint.

Cite this