Aulov I. The method and means of the installation of personal user keys in the cloud

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0416U004815

Applicant for

Specialization

  • 05.13.21 - Системи захисту інформації

10-11-2016

Specialized Academic Board

Д 64.051.29

V.N. Karazin Kharkiv National University

Essay

In the thesis proposed the user's key data threat model for cloud services considering objects of the cloud environment for which threat, the purpose of realization of threat and its probability is realized is offered. The improved cloud computing threats model allows evaluating the effectiveness of remedies and minimizing losses due to the use of risk assessment and methods for assessing effectiveness. The proposed model differs from the NIST SP 500-299 that threats are considered, using profile of attacker, goal that achieved in the implementation of the threat and the potential threat. The mechanism of generation and installation the general key pair between N hardware secure modules in the cloud is proposed. It allows to establish keys without transfer private keys through not entrusted communication channel by using a modified Diffie-Hellman algorithm. For the mechanism of key management in the cloud environment in the thesis proposed the model of mass service system. It allows to estimate efficiency of realization of the mechanism and to perform its optimization on such indicators as average time of the answer, average time of expectation of processing of inquiry, average length of turn of inquiries and average amount of inquiries in system. Keywords: cloud computing, key management mechanisms, the threat model, hardware secure modules, queuing theory

Files

Similar theses