KEY MANAGEMENT PROCESS ON THE HARDWARE CRYPTOGRAPHIC MODULE IN THE CLOUD COMPUTING

John Manuel Delgado Barroso, Luis Joyanes Aguilar, Pablo García Gundín

Abstract

Cloud computing has multiple applications, from a standpoint of growth performance computing capabilities and data processing also offers a number of operational models, leaving out no items related to the scalability of the platform but with data security that it is managed and therefore the information in it are processed. The purpose of this paper is to implement a novel key management protocol on a platform of hardware cryptographic module to provide a solution to the management model, generation and use of cryptographic keys in the vicinity of cloud computing.

References

  1. Marchini R. 2010, Paper, Cloud Computing: a practical introduction to the legal issue, BSI Standards. Avaliable at: http://www.whsmith.co.uk/ CatalogAndSearch/ProductDetails.aspx?ProductID=97 80580703225, Last Update: Undefined.
  2. Martin Luther. 2008, Article, Key Management Infrastructure for Protecting Stored Data, IEEE Computer. Avaliable at: http://www.tschofenig.priv.at/ wp/wp-content/uploads/2008/05/r6secu1.pdf, Last Update: Undefined.
  3. Mather T, Kumaraswamy S. 2009. Book, Cloud security and Privacy, O'Reilly Media.
  4. Oasis, 2009. Oasis Members Form Key Management Interoperability Protocol (KMIP) Technical Committee, Available: www.oasis-open.org, Last Update: Undefined.
  5. Oasis, 2009, KMIP: Key Management Interoperability Protocol., WP. Avaliable at: http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=kmip Last Update: Undefined.
  6. Fajardo Ed. And R. Marin-Lopez, 2009 , RFC 5609 - State Machines for the Protocol for Carrying Authentication for Network Access (PANA), Network Working Group., Available: http://datatracker.ietf.org/ wg/pana/charter/,. Last update: undefined.
  7. Rittinghouse J,. 2009, Cloud Computing: Implementation, Management and Security, CRC Press, Available: http://www.crcpress.com/product/isbn/978143980680 7 , Last update: undefined.
  8. Rungren A,. 2008, KeyGen2 Presentation, V0.31,, Available: http://webpki.org, Last update:Undefined.
Download


Paper Citation


in Harvard Style

Manuel Delgado Barroso J., Joyanes Aguilar L. and García Gundín P. (2010). KEY MANAGEMENT PROCESS ON THE HARDWARE CRYPTOGRAPHIC MODULE IN THE CLOUD COMPUTING . In Proceedings of the International Conference on Knowledge Engineering and Ontology Development - Volume 1: KEOD, (IC3K 2010) ISBN 978-989-8425-29-4, pages 493-496. DOI: 10.5220/0003142304930496


in Bibtex Style

@conference{keod10,
author={John Manuel Delgado Barroso and Luis Joyanes Aguilar and Pablo García Gundín},
title={KEY MANAGEMENT PROCESS ON THE HARDWARE CRYPTOGRAPHIC MODULE IN THE CLOUD COMPUTING},
booktitle={Proceedings of the International Conference on Knowledge Engineering and Ontology Development - Volume 1: KEOD, (IC3K 2010)},
year={2010},
pages={493-496},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003142304930496},
isbn={978-989-8425-29-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Knowledge Engineering and Ontology Development - Volume 1: KEOD, (IC3K 2010)
TI - KEY MANAGEMENT PROCESS ON THE HARDWARE CRYPTOGRAPHIC MODULE IN THE CLOUD COMPUTING
SN - 978-989-8425-29-4
AU - Manuel Delgado Barroso J.
AU - Joyanes Aguilar L.
AU - García Gundín P.
PY - 2010
SP - 493
EP - 496
DO - 10.5220/0003142304930496