Secure Key Management System in Cloud Environment for Client data
Pradeep. K. V1, Vijayakumar. V2

1Pradeep. K.V, SCSE, VIT-Chennai Campus, Chennai (Tamil Nadu), India.
2Vijayakumar . V, SCSE, VIT-Chennai Campus, Chennai (Tamil Nadu), India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 1490-1496 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7725068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this evolving technology era, cloud computing has emerged drastically by the means of the Internet and remote server for maintaining applications and data. In actual none of the physical resources are owned by the cloud computing customers, rather they are rented from some third party. The major management approaches involve Users initialization and key generation, expiration and destruction. Significant information is being transferred by the enterprises over the cloud,this leads to the concerning issue of data security. For safeguarding this critical information, the technique of Cryptography is being utilized. The technique of Cryptography incorporates the handling of encryption and decryption keys. With the recommended approach of SKMS (Secure Key Management System), the user’s data is stored in the cloud area. By logging with the essential credentials, the user can upload the required files. Files are stored by the authorized user in the cloud domain thereby generating key via key generation. User Data is Encrypted via RSA, which in turn generates both Public and Private Keys. Now the Private Key (Say K1) is again re-encrypted via ECC to obtain the encrypt key (Say K2). Thereafter the re-encrypted key K2 is split into ‘N’ parts which are located in the cloud environment. For decrypting the file, key K1 is required, hence ‘K’ parts are pulled out of ‘N’ parts from the cloud such that (K<n). next,=”” by=”” making=”” use=”” of=”” ecc,=”” key=”” k2=”” is=”” decrypted=”” to=”” obtain=”” the=”” original=”” k1.=”” now=”” k1=”” used=”” decrypt=”” file=”” via=”” rsa.=”” handling=”” stages=”” skms=”” (skms)=”” technique=”” involves=”” user=”” registration=”” and=”” login,=”” uploading,=”” key-encryption,=”” key-splitting,=”” key-decryption=”” decryption=”” file.=”” its=”” depicted=”” form=”” experimental=”” analysis=”” that=”” minimizes=”” time=”” complexity=”” generating=”” encryption=”” key.=”” this=”” makes=”” it=”” useful=”” in=”” contrast=”” already=”” prevailing=”” system<br=””> Keywords: Cloud Computing, Cryptography, Secure Key Management System (SKMS), Advanced Encryption Standard, Elliptic Curve Cryptography, Shamir Algorithm, Key Generation, Key Encryption, Key Splitting, Key Decryption.</n).>
Scope of the Article: Cloud Computing