An Efficient Group Authentication Mechanism Supporting Key Confidentiality, Key Freshness And Key Authentication In Cloud Computing

被引:0
|
作者
Nair, Nikhitha K. [1 ]
Navin, K. S. [2 ]
机构
[1] Sarabhai Inst Sci & Technol, Dept Comp Sci & Engn, Thiruvananthapuram 695543, Kerala, India
[2] LBS Inst Technol Women, Dept Comp Sci & Engn, Thiruvananthapuram 695012, Kerala, India
关键词
Group Authentication; Key Freshness; Encryption; Key Confidentiality; Cloud computing; USER AUTHENTICATION; NETWORKS; SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A Group authentication emphasis on communication between the members of a group and then authenticates the members. The main purpose of group communication is to share and exchange ideas and messages with different members of the group. The messages are sent to each other in encrypted form to enhance security. The group manager has the responsibility of overall control over the group. A group key is there for each group which generates the session keys which are used by the group members to share the secret messages.
引用
收藏
页码:288 / 292
页数:5
相关论文
共 50 条
  • [41] Efficient Blockchain-Based Group Key Distribution for Secure Authentication in VANETs
    Shawky, Mahmoud A.
    Jabbar, Abdul
    Usman, Muhammad
    Imran, Muhammad
    Abbasi, Qammer H.
    Ansari, Shuja
    Taha, Ahmad
    IEEE Networking Letters, 2023, 5 (01): : 64 - 68
  • [42] GROUP-ORIENTED KEY MANAGEMENT AND AUTHENTICATION METHOD
    MUTOH, Y
    TAKAGI, K
    OKADA, K
    MATSUSHITA, Y
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 540 - 546
  • [43] Resilient Group Key Agreement Protocol with Authentication Security
    Rajaram, M.
    Thilagavathy, D.
    Devi, N. Kanjana
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGIES (ICICT), 2010,
  • [44] A Self-Authentication and Deniable Efficient Group Key Agreement Protocol for VANET
    Han, Mu
    Hua, Lei
    Ma, Shidian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (07): : 3678 - 3698
  • [45] Group authentication and group key distribution for Ad hoc networks
    Wang, Feng
    Chang, Chin-Chen
    Chou, Yeh-Chieh
    International Journal of Network Security, 2015, 17 (02) : 199 - 207
  • [46] Infringing key authentication of an ID-Based group key exchange protocol using binary key trees
    Nam, Junghyun
    Paik, Juryon
    Lee, Youngsook
    Kwak, Jin
    Kim, Ung Mo
    Won, Dongho
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT I, PROCEEDINGS, 2007, 4692 : 672 - +
  • [47] DGKD: Distributed group key distribution with authentication capability
    Adusumilli, P
    Zou, XK
    Ramamurthy, B
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 286 - 293
  • [48] Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak
    Braeken, An
    SENSORS, 2020, 20 (08)
  • [49] Efficient authentication and key distribution in wireless IP networks
    Salgarelli, L
    Buddhikot, M
    Garay, J
    Patel, S
    Miller, S
    IEEE WIRELESS COMMUNICATIONS, 2003, 10 (06) : 52 - 61
  • [50] An Efficient Lightweight Key Agreement and Authentication Scheme for WBAN
    Rehman, Zia Ur
    Altaf, Saud
    Iqbal, Saleem
    IEEE ACCESS, 2020, 8 : 175385 - 175397