A Comprehensive Analysis of Key Management Models in the Cloud: Design, Challenges, and Future Directions

Author(s):  
S. Ahamed Ali ◽  
M. Ramakrishnan ◽  
N. Duraipandian
2010 ◽  
Vol 122 (2) ◽  
pp. 84 ◽  
Author(s):  
Geoff Nevill

This paper presents an overview of activities to conserve a suite of threatened orchid taxa within the North Central region between 2003 and 2009. Historical and current threats to orchid populations are outlined and management responses detailed, together with results of key management actions. Knowledge gaps are identified, with past and current actions to address some of these included. Future directions for the conservation of threatened orchids in the region are briefly discussed.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
S. Bertuccio ◽  
G. Tardiolo ◽  
F. M. Giambò ◽  
G. Giuffrè ◽  
R. Muratore ◽  
...  

Abstract Background The cloud is a promising resource for data sharing and computing. It can optimize several legacy processes involving different units of a company or more companies. Recently, cloud technology applications are spreading out in the healthcare setting as well, allowing to cut down costs for physical infrastructures and staff movements. In a public environment the main challenge is to guarantee the patients’ data protection. We describe a cloud-based system, named ReportFlow, developed with the aim to improve the process of reporting and delivering electroencephalograms. Methods We illustrate the functioning of this application through a use-case scenario occurring in an Italian hospital, and describe the corresponding key encryption and key management used for data security guarantee. We used the X2 test or the unpaired Student t test to perform pre-post comparisons of some indexes, in order to evaluate significant changes after the application of ReportFlow. Results The results obtained through the use of ReportFlow show a reduction of the time for exam reporting (t = 19.94; p < 0.001) and for its delivering (t = 14.95; p < 0.001), as well as an increase of the number of neurophysiologic examinations performed (about 20%), guaranteeing data integrity and security. Moreover, 68% of exam reports were delivered completely digitally. Conclusions The application resulted to be an optimal solution to optimize the legacy process adopted in this scenario. The comparative pre-post analysis showed promising preliminary results of performance. Future directions will be the creation and release of certificates automatically.


Author(s):  
Keith M. Martin

This chapter builds on the previous one by considering additional key management issues that arise for management of public-key pairs. We identify why management of public keys presents special challenges and then consider different approaches to addressing these issues. We consider certification of public keys and examine the different stages in the lifecycle of a public-key certificate, paying particular attention to the creation and revocation of public-key certificates. In doing so, we investigate that it means to rely on a public-key certificate and what issues can arise with the deployment of public-key management infrastructures that are based on public-key certificates. We close by considering some alternative public-key management models that do not rely on public-key certificates.


Author(s):  
Martin Rublík

Cryptographic key distribution and management is one of the most important steps in the process of securing data by utilizing encryption. Problems related to cryptographic key distribution and management are hard to solve and easy to exploit, and therefore, they are appealing to the attacker. The purpose of this chapter is to introduce the topics of cryptographic key distribution and management, especially with regards to asymmetric keys. The chapter describes how these topics are handled today, what the real-world problems related to cryptographic key distribution and management are, and presents existing solutions as well as future directions in their solving. The authors present the cryptographic key management and distribution problems from a multidisciplinary point of view by looking at its economic, psychological, usability, and technological aspects.


2021 ◽  
Author(s):  
Moh Chuan Tan ◽  
Minghui Li ◽  
Qammer H. Abbasi ◽  
Muhammad Ali Imran

2019 ◽  
Vol 21 (4) ◽  
pp. 3340-3385 ◽  
Author(s):  
Reza Shakeri ◽  
Mohammed Ali Al-Garadi ◽  
Ahmed Badawy ◽  
Amr Mohamed ◽  
Tamer Khattab ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document