A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT

被引:0
|
作者
Sriprasadh, K. [1 ]
Saicharansrinivasan [2 ]
Pandithurai, O. [3 ]
Saravanan, A. [2 ]
机构
[1] Thirumalai Engg Coll, Kanchipuram, India
[2] Rajalakshmi Inst Technol, Dept CSE, Madras, Tamil Nadu, India
[3] Anna Univ Technol, Coimbatore, Tamil Nadu, India
关键词
Cloud computing; Multicast key management; Session key;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is the technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth. In this security is an important issue to provide a security for this cloud we introduce a novel method for securing cloud by providing multicast key for each user. It will be a dynamic session key which will vary in the time of period. Whenever a new user enters into the cloud the new key will be generated. It will withstand for a time period. After that time period the user should renew the key for the further usage of the cloud.
引用
收藏
页码:305 / 311
页数:7
相关论文
共 50 条
  • [1] Secure Hierarchical Key Management for Cloud Computing
    Liu, Jin
    Sun, Jing
    Yow, Kin-Choong
    Peng, Xian-Bin
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 399 - 405
  • [2] A novel key management and distribution solution for secure video multicast
    Yin, H
    Chu, XW
    Lin, C
    Qiu, F
    Min, GY
    [J]. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2005, PT 2, 2005, 3768 : 246 - 257
  • [3] Key management for secure overlay multicast
    Roh, JH
    Lee, KH
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 336 - 345
  • [4] A novel batch rekeying processor architecture for secure multicast key management
    Shoufan, A
    Huss, SA
    Cutleriwala, M
    [J]. HIGH PERFORMANCE EMBEDDED ARCHITECTURES AND COMPILERS, PROCEEDINGS, 2005, 3793 : 169 - 183
  • [5] A novel high-order tree for secure multicast key management
    Lu, HB
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2005, 54 (02) : 214 - 224
  • [6] Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
    Li, Wei
    Li, Xuelian
    Gao, Juntao
    Wang, Haiyu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1276 - 1290
  • [7] Secure decentralized multicast key management scheme
    Yang, Ming
    Xiao, Yang
    Lu, Shan-Shan
    [J]. Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2008, 9 (01): : 20 - 24
  • [8] Proxy encryptions for secure multicast key management
    Mukherjee, R
    Atwood, JW
    [J]. LCN 2003: 28TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2003, : 377 - 384
  • [9] A hierarchical key management approach for secure multicast
    Wang, J
    Mihaljevic, MJ
    Harn, L
    Imai, H
    [J]. ARCHITECTURE OF COMPUTING SYSTEMS - ARCS 2006, PROCEEDINGS, 2006, 3894 : 422 - 434
  • [10] Efficient algorithms for secure multicast key management
    Khabiri, Elham
    Bettayeb, Said
    [J]. 31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 787 - +