Efficient Key Generation and Distribution Techniques Leveraging Metadata in Cloud Security

Authors

  • Kashyap Chopra India Author

Keywords:

key management operations, cloud security, metadata-driven

Abstract

Efficient key generation and distribution are critical components in ensuring the security of data stored in cloud environments. Leveraging metadata offers a promising approach to enhance these processes by providing context and structure to key management operations. This paper explores various techniques and methodologies that utilize metadata for optimizing key generation and distribution in cloud security. By analyzing the impact of metadata-driven approaches, this study aims to highlight their effectiveness in addressing key management challenges such as scalability, efficiency, and security in cloud computing environments.

References

Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.

Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.

Bellare, M., & Rogaway, P. (1993). Entity authentication and key distribution. In Proceedings of the 1993 ACM Conference on Computer and Communications Security (pp. 232-249).

Salim, N. E. (2013). Advancements in gene expression analysis through distinguishability-based feature selection. Journal of Recent Trends in Computer Science and Engineering (JRTCSE), 1(1), 30-36.

Blaze, M., Bleumer, G., & Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In Proceedings of the 1998 IEEE Symposium on Security and Privacy (pp. 127-140).

Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612-613.

Published

2014-09-10

How to Cite

Efficient Key Generation and Distribution Techniques Leveraging Metadata in Cloud Security. (2014). JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), 2(2), 1-11. https://jrtcse.com/index.php/home/article/view/JRTCSE.2014.2.1