FEATURES OF THE MANAGEMENT OF DATA ENCRYPTION KEYS IN THE CLOUD STORAGE MS SQL AZURE

Olexander Beley

Oleksandr.I.Belei@lpnu.ua
Lviv Polytechnic National University, Institute of Computer Science and Information Technologies / Department of Computer-Aided Design (Ukraine)
http://orcid.org/0000-0003-4150-7425

Abstract

The main principles of data security and access organization in the Microsoft Azure cloud storage are considered. A role of hierarchy and access keys are presented. We describe the setup and the use of their keys (BYOK) for transparent data encryption (TDE) using Azure Key Vault keyring.


Keywords:

communication equipment, data communication, cyberspace, data transfer

Amies Alex H. S., Qiang Guo Tong, Guo Ning Liu.: Developing and Hosting Applications on the Cloud. IBM Press, 2012.
  Google Scholar

Armbrust M., et al.: A view of cloud computing. Commun. ACM 53/2010, 50–58.
  Google Scholar

Armbrust M., et al.: Above the Clouds: A Berkeley View of Cloud Computing, 2009.
  Google Scholar

Buyya R., et al.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25/2009, 599–616.
  Google Scholar

Casanova H.: Simgrid: a toolkit for the simulation of application scheduling. Cluster Computing and the Grid, 2001. Proceedings. First IEEE/ACM International Symposium on, 2001, 430–437.
  Google Scholar

Dean J., Ghemawat S.: MapReduce: Simplified Data Processing on Large Clusters. ACM OSDI, Dec. 2004.
  Google Scholar

Hamdaqa Mohammad L. T., Ladan T.: A Reference Model for Developing Cloud Applications. Presented at the CLOSER, 2011.
  Google Scholar

Krauter K., et al.: A taxonomy and survey of grid resource management systems for distributed computing. Software: Practice and Experience 32/2002, 135–164.
  Google Scholar

Qaisar E. J.: Introduction to cloud computing for developers: Key concepts, the players and their offerings. Information Technology Professional Conference (TCF Pro IT), IEEE TCF, 2012, 1–6.
  Google Scholar

Quiroz A., et al.: Towards autonomic workload provisioning for enterprise Grids and clouds. 10th IEEE/ACM International Conference on Grid Computing, 2009, 50–57.
  Google Scholar

Rajkumar Buyya R. N. C.: Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities. Presented at the 7th High Performance Computing and Simulation Conference (HPCS), Leipzig, Germany.
  Google Scholar

Trunfio P., et al.: Peer-to-Peer resource discovery in Grids: Models and systems. Future Gener. Comput. Syst. 23/2007, 864–878.
  Google Scholar

Voorsluys W., et al: Introduction to Cloud Computing. Cloud Computing. John Wiley & Sons, Inc., 2011.
  Google Scholar

Download


Published
2018-12-16

Cited by

Beley, O. (2018). FEATURES OF THE MANAGEMENT OF DATA ENCRYPTION KEYS IN THE CLOUD STORAGE MS SQL AZURE. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 8(4), 12–15. https://doi.org/10.5604/01.3001.0012.8013

Authors

Olexander Beley 
Oleksandr.I.Belei@lpnu.ua
Lviv Polytechnic National University, Institute of Computer Science and Information Technologies / Department of Computer-Aided Design Ukraine
http://orcid.org/0000-0003-4150-7425

Statistics

Abstract views: 454
PDF downloads: 325