Summary: Proposed a new generation mechanism and the establishment of a private key pair in the cloud without private key transfer. Improved implementation of user authentication algorithm in the cloud using OAuth, by applying the algorithm of digital signature DSTU 4145-2012 and hardware protection.
Key words: key management, the OAuth, hardware protection, cloud.