Cryptographic Key Management for Data Protection
Electrosoft Services, Inc. Reston, Virginia
CONTENTS
11.4 Key Management System Design Choices
11.5 Drivers for Cloud Key Management Design
11.6 Cloud Key Management Challenges
11.7 Cloud Key Management Strategies
11.7.1 Minimize Data to Be Encrypted
11.7.2 Separate Ciphertext from Keys
11.7.3 Maximize Separation between Ciphertext and Keys
11.7.4 Establish Trust in Cryptomodule
11.7.5 Use Key Splitting Techniques
11.1 INTRODUCTION
Public and private sector organizations, as well as individuals, have been moving large amounts of data to the cloud over the past decade. ...
Get Cloud Computing Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.