An Efficient Group Authentication Mechanism Supporting Key Confidentiality, Key Freshness And Key Authentication In Cloud Computing

被引:0
|
作者
Nair, Nikhitha K. [1 ]
Navin, K. S. [2 ]
机构
[1] Sarabhai Inst Sci & Technol, Dept Comp Sci & Engn, Thiruvananthapuram 695543, Kerala, India
[2] LBS Inst Technol Women, Dept Comp Sci & Engn, Thiruvananthapuram 695012, Kerala, India
关键词
Group Authentication; Key Freshness; Encryption; Key Confidentiality; Cloud computing; USER AUTHENTICATION; NETWORKS; SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A Group authentication emphasis on communication between the members of a group and then authenticates the members. The main purpose of group communication is to share and exchange ideas and messages with different members of the group. The messages are sent to each other in encrypted form to enhance security. The group manager has the responsibility of overall control over the group. A group key is there for each group which generates the session keys which are used by the group members to share the secret messages.
引用
收藏
页码:288 / 292
页数:5
相关论文
共 50 条
  • [21] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture
    Huihui Huang
    Siqi Lu
    Zehui Wu
    Qiang Wei
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [22] Group-Based Authentication and Key Agreement
    Yu-Wen Chen
    Jui-Tang Wang
    Kuang-Hui Chi
    Chien-Chao Tseng
    Wireless Personal Communications, 2012, 62 : 965 - 979
  • [23] Group-Based Authentication and Key Agreement
    Chen, Yu-Wen
    Wang, Jui-Tang
    Chi, Kuang-Hui
    Tseng, Chien-Chao
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 62 (04) : 965 - 979
  • [24] Efficient remote mutual authentication and key agreement
    Shieh, WG
    Wang, FM
    COMPUTERS & SECURITY, 2006, 25 (01) : 72 - 77
  • [25] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754
  • [26] EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs
    Athmani, Samir
    Bilami, Azeddine
    Boubiche, Djallel Eddine
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 : 789 - 799
  • [27] GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications
    Nakkar, Mouna
    AlTawy, Riham
    Youssef, Amr
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 840 - 854
  • [28] Authentication and key distribution methods in mobile computing environments
    Zhang, B
    Wu, JX
    2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 353 - 356
  • [29] Secure Key Management Based Mobile Authentication in Cloud
    Priya, S. Shanmuga
    Yuvaraj, D.
    Murthy, T. Satyanarayana
    Chooralil, Varghese S.
    Krishnan, S. Navaneetha
    Banumathy, P.
    SundaraVadivel, P.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 887 - 896
  • [30] Efficient certificateless authentication and key agreement (CL-AK) for grid computing
    Department of Computer Science and Engineering, Shanghai Jiao Tong University, 1954 Huashan Road, Shanghai 200030, China
    不详
    International Journal of Network Security, 2008, 7 (03) : 342 - 347