This article discusses key management strategies for the SaaS cloud model, and unique security problems to be dealt with because of lack of user control.
This article discusses key management strategies for the SaaS cloud model, and unique security problems to be dealt with because of lack of user control.
Key management is the administration of tasks involved in all aspects of cryptographic key usage in a cryptosystem. This includes dealing with the generation, distribution, exchange, storage, use, and replacement of keys. All aspects of security should be covered for the life-cycle of a key, from key generation to replacement, storage, or disposal. Each key must also be protected during its life-time to prevent unauthorized disclosure, modification, substitution, replay, and improper use. Likewise, the functions used in key management must be prevented from such unauthorized use.