Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
The Advances in the Security of Cloud Services using Customer Master Encryption Keys (CMEK)
Author(s):
1. Swethasri Kavuri: Independent Researcher,USA.
Abstract:
This research paper examines the role of Customer-Managed Encryption Keys (CMEK) in enhancing security for cloud services. As organizations increasingly migrate their data and operations to the cloud, concerns about data privacy and security have become paramount. CMEK offers a solution by allowing customers to retain control over their encryption keys while leveraging cloud infrastructure. This study explores the architecture, implementation, and implications of CMEK across various cloud service models. It analyzes cryptographic techniques, performance considerations, security challenges, and compliance requirements associated with CMEK. The research also delves into advanced concepts and future directions, including homomorphic encryption and blockchain-based key management. By synthesizing current literature and industry practices, this paper provides a comprehensive overview of CMEK and its potential to revolutionize cloud security.
Page(s): 375-394
DOI: DOI not available
Published: Journal: International Journal of Communication Networks and Information Security, Volume: 16, Issue: 1, Year: 2024
Keywords:
compliance , Cloud Security , Data Encryption Cryptography , Key Management Systems KMS , CustomerManaged Encryption Keys CMEK , Hardware Security Modules HSM , Cloud Service Models
References:
[1] Acar A.,Aksu H.,Uluagac A. S.,Conti M. .2018 .A Survey on Homomorphic Encryption Schemes: Theory and Implementation. , 51(4) : 1-35.
[2] Accenture. .2018 .Blockchain-based key management: A pilot study in financial services. Accenture Research., : .
[3] Accenture. .2018 .Side-channel attacks in cloud environments: Detection and mitigation strategies. , : .
[4] Amazon Web Services. .2018 .AWS Key Management Service: Best practices. AWS Whitepaper., : .
[5] Amazon Web Services. .2018 .AWS Key Management Service: Best practices for disaster recovery. AWS Whitepaper., : .
[6] .2018 .CMEK and data privacy laws: A comparative analysis. UC, : .
[7] Chen Y.,Chen H.,Li X. .2018 .Performance analysis of customer-managed encryption keys in cloud environments. IEEE Transactions on Cloud Computing, 6(4) : 1125-1134.
[8] Chen Y.,Zhang Q.,Zheng Y. .2018 .Performance analysis of customer-managed encryption keys in cloud environments. IEEE Transactions on Cloud Computing, 6(4) : 1024-1035.
[9] Cisco. .2019 .IoT security challenges in edge computing environments. Cisco Security Research., : .
[10] Cloud Security Alliance. .2018 .Cloud Controls Matrix (CCM). , : .
[11] Cloud Security Alliance. .2019 .State of cloud security 2019. CSA Report., : .
[12] Cloud Security Alliance. .2019 .. CSA Research Report., : .
[13] Deloitte. .2019 .GDPR compliance in cloud environments: A comparative analysis. Deloitte Risk Advisory Services., : .
[14] Deloitte. .2019 .GDPR compliance in cloud environments: A comprehensive analysis. Deloitte Insights., : .
Citations
Citations are not available for this document.
0

Citations

0

Downloads

1

Views