A Study of Hierarchical Group Key Management

Authors

  • Ghanshyam Shivcharan Nikhade Research Scholar, Department of Computer Science, Sardar Patel University, Balaghat ,M.P. Author
  • Dr. Tryambak Hiwarkar Professor, Department of Computer Science and Engineering, Sardar Patel University, Balaghat, M.P. Author

DOI:

https://doi.org/10.29070/ff6vjy64

Keywords:

Hierarchical, Group, Key Management, Access Control, Cloud Communication

Abstract

Data security in the cloud is where the majority of the most recent work has focused its attention.For safe data transfer in a cloud context, a new key management method that allows for multicastcommunication must be presented. The study proposes a novel hierarchical key management techniquesuitable for multicast communication in the cloud. For big, ever-changing multicast systems, the suggestedapproach is the best option due to its efficiency and scalability. Managing access control to approve andauthenticate users utilizing the data is another significant difficulty in a cloud setting. The paradigm ofaccess control used in a conventional setting is very different from that used in the cloud. Therefore,encryption methods, in addition to the access control strategy, must be implemented to safeguard data ingroup communication.

Downloads

Download data is not yet available.

References

Sakshi Chhabra (2020) on “Security Enhancement in Cloud Environment using Secure Secret Key Sharing”, Journal Of Communications Software And Systems, VOL. 16, NO. 4.

Pradeep. K. V, Vijayakumar. V (2019) on “Secure Key Management System in Cloud Environment for Client data”, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249-8958, Volume-8 Issue-5

Matthew Campagna, Shay Gueron (2019) on “Key Management Systems at the Cloud Scale”, Cryptography, 3, 23; doi:10.3390/cryptography3030023

Padinjappurathu Gopalan Shynu, Kumaresan John Singh (2017) on “An Enhanced ABE based Secure Access Control Scheme for E-health Clouds”, International Journal of Intelligent Engineering and Systems, Vol.10, No.5

Madhura Mulimani, Rashmi Rachh (2017) on “Analysis of Access Control Methods in Cloud Computing”, I.J. Education and Management Engineering, 3, 15-24

Sultan Aldossary, William Allen (2016) on “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4

Kire Jakimoski (2016) on “Security Techniques for Data Protection in Cloud Computing”, International Journal of Grid and Distributed Computing, Vol. 9

S.Raghavendra, K.Meghana, P.A.Doddabasappa (2016) on “Index Generation and Secure Multi-user Access Control over an Encrypted Cloud Data”, Procedia Computer Science Volume 89, 2016, Pages 293-300

Surya Nepal, Carsten Friedrich, Catherine Wise (2016) on “key management service: enabling secure sharing and deleting of documents on public clouds”, Services Transactions of Cloud Computing (ISSN 2326-7550)

Mansura Habiba, Md. Rafiqul Islam (2015) on “A New Approach to Access Control in Cloud”, Arabian Journal for Science And Engineering 41(3) DOI:10.1007/s13369-015-1947-8

S. Muthurajkumar, S.Ganapathy, M. Vijayalakshmi, A. Kannan (2015) on “Secured Temporal Log Management Techniques for Cloud”, International Conference on Information and Communication Technologies, doi: 10.1016/j.procs.2015.02.098

Shabana Rehman, Rahul Gautam (2014) on “Research on Access Control Techniques in SaaS of Cloud Computing”, International Symposium on Security in Computing and Communication.

Downloads

Published

2022-03-01