Return to search

Encryption key generation in Cloud environments

Protecting Cloud services located within the Cloud Computing centre easily would be a significant advantage in the current Cloud computing market. However, the existing encryption system all process a notable weakness that the private key must be stored locally, so could be accessed and used to break the encryption. To solve this problem, a novel technology has been investigated that recompose the private key by using the properties and behaviours extracted from a Cloud server during execution. This thesis will investigate the feasibility of this approach by analysing simple online programs which would typically form the basis or components of larger systems and thereby indicate, by the ability to distinguish such simple systems, which larger real world practical systems may also be distinguished. The private key does not need to store in the system, which this paper has proved such a system is feasible to be applied in the current encryption system.

Identiferoai:union.ndltd.org:bl.uk/oai:ethos.bl.uk:713014
Date January 2016
CreatorsYe, Bin
ContributorsHowells, Gareth
PublisherUniversity of Kent
Source SetsEthos UK
Detected LanguageEnglish
TypeElectronic Thesis or Dissertation
Sourcehttps://kar.kent.ac.uk/61263/

Page generated in 0.0017 seconds