SHARE
Facebook X Pinterest WhatsApp

Cryptographic Key Management Issues & Challenges in Cloud Services

Cryptographic Key Management Issues & Challenges in Cloud Services The management of cryptographic keys is a critical and challenging security management function, especially in the case of a cloud environment. Encryption and access control are the two primary means for ensuring data confidentiality in any IT environment. In situations where encryption is used as a […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Sep 25, 2013

Cryptographic Key Management Issues & Challenges in Cloud Services

The management of cryptographic keys is a critical and challenging security management function, especially in the case of a cloud environment.


Encryption and access control are the two primary means for ensuring data confidentiality in any IT environment. In situations where encryption is used as a data confidentiality assurance measure, the management of cryptographic keys is a critical and challenging security management function, especially in large enterprise data centers, due to sheer volume and data distribution (in different physical and logical storage media), and the consequent number of cryptographic keys. This function becomes more complex in the case of a cloud environment, where the physical and logical control of resources (both computing and networking) is split between cloud actors (e.g., consumers, providers, and brokers).

The objectives of this document are to identify:

(a)   The cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control, the latter split among multiple cloud actors. Furthermore, the pattern of distribution varies with the type of service offering – infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS).

(b)   The special challenges involved in deploying cryptographic key management functions that meet the security requirements of the cloud consumers, depending upon the nature of the service and the type of data generated/processed/stored by the service features.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • CryptographicKeyMgmt.pdf

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.