Secure Management of Key Distribution in Cloud Scenarios

被引:0
|
作者
Cui, Zongmin [1 ,2 ]
Zhu, Hong [1 ]
Yu, Jing [2 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Peoples R China
[2] Jiujiang Univ, Jiujiang, Peoples R China
关键词
key distribution; tag derivation; key derivation; cloud computing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing key distribution scheme based on key derivation has security default in cloud scenarios. The scheme distributes decryption keys to users through tags stored on cloud server. If the tag is destroyed by cloud server intentionally or unintentionally, the key distribution is destroyed too. Besides the above case, if all related tags are stored on client operated by user, the storage burden is high. To eliminate the insecurity of key distribution, we propose a novel solution based on tag derivation. In our scheme, each user needs to manage a single key and tag. Through the two information, the user can compute all authorized keys without using any information stored on cloud server. That is, our key distribution scheme is unrelated to cloud server to enhance the security of key distribution. The experiment results show that the performance of our method is better than existing methods in key distribution and query.
引用
收藏
页码:18 / 21
页数:4
相关论文
共 50 条
  • [1] Key management and key distribution for secure group communication in mobile and cloud network
    Vijayakumar, P.
    Chang, Victor
    Deborah, L. Jegatha
    Kshatriya, Bharat S. Rawal
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 123 - 125
  • [2] Secure key distribution based on key derivation for cloud
    School of Information Science and Technology, Jiujiang University, Jiujiang, China
    J. Comput. Inf. Syst., 15 (5689-5696):
  • [3] Secure Hierarchical Key Management for Cloud Computing
    Liu, Jin
    Sun, Jing
    Yow, Kin-Choong
    Peng, Xian-Bin
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 399 - 405
  • [4] Versatile Key Management for Secure Cloud Storage
    Graf, Sebastian
    Lang, Patrick
    Hohenadel, Stefan A.
    Waldvogel, Marcel
    2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, : 469 - 474
  • [5] Secure Key-distribution in IoT Cloud Networks
    Moharana, Soumya Ranjan
    Jha, Vijay Kumar
    Satpathy, Anurag
    Addya, Sourav Kanti
    Turuk, Ashok Kumar
    Majhi, Banshidhar
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 197 - 202
  • [6] Efficient key management of data owner for cloud scenarios
    Cui, Zongmin
    Zhang, Lifen
    Gao, Guangyong
    Zhou, Caixue
    Deng, Anyuan
    Journal of Computational Information Systems, 2015, 11 (21): : 7693 - 7700
  • [7] Secure Key Management Based Mobile Authentication in Cloud
    Priya, S. Shanmuga
    Yuvaraj, D.
    Murthy, T. Satyanarayana
    Chooralil, Varghese S.
    Krishnan, S. Navaneetha
    Banumathy, P.
    SundaraVadivel, P.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 887 - 896
  • [8] Key management and distribution for secure multimedia multicast
    Trappe, W
    Song, J
    Poovendran, R
    Liu, KJR
    IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (04) : 544 - 557
  • [9] Quantum Key Distribution Approach for Secure Authentication of Cloud Servers
    Fatima, Shahin
    Ahmad, Shish
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2021, 11 (03) : 19 - 32
  • [10] Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage
    Kwon, Hyunsoo
    Hahn, Changhee
    Koo, Dongyoung
    Hur, Junbeom
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 391 - 398