CHAPTER 11
Cryptographic Key Management for Data Protection
Sarbari Gupta
Electrosoft Services, Inc.
Reston, Virginia
Contents
11.4 Key Management System Design Choices
11.5 Drivers for Cloud Key Management Design
11.6 Cloud Key Management Challenges
11.7 Cloud Key Management Strategies
11.7.1 Minimize Data to Be Encrypted
11.7.2 Separate Ciphertext from Keys
11.7.3 Maximize Separation between Ciphertext and Keys
11.7.4 Establish Trust in Cryptomodule
11.7.5 Use Key Splitting Techniques
11.1 Introduction
Public and privaate sector organizations, as well as individuals, have been moving large amounts of data to the cloud over the past decade. This is the ...