Secure Management of Key Distribution in Cloud Scenarios

被引:0
|
作者
Cui, Zongmin [1 ,2 ]
Zhu, Hong [1 ]
Yu, Jing [2 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Peoples R China
[2] Jiujiang Univ, Jiujiang, Peoples R China
关键词
key distribution; tag derivation; key derivation; cloud computing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing key distribution scheme based on key derivation has security default in cloud scenarios. The scheme distributes decryption keys to users through tags stored on cloud server. If the tag is destroyed by cloud server intentionally or unintentionally, the key distribution is destroyed too. Besides the above case, if all related tags are stored on client operated by user, the storage burden is high. To eliminate the insecurity of key distribution, we propose a novel solution based on tag derivation. In our scheme, each user needs to manage a single key and tag. Through the two information, the user can compute all authorized keys without using any information stored on cloud server. That is, our key distribution scheme is unrelated to cloud server to enhance the security of key distribution. The experiment results show that the performance of our method is better than existing methods in key distribution and query.
引用
收藏
页码:18 / 21
页数:4
相关论文
共 50 条
  • [21] Attribute-Based Convergent Encryption Key Management for Secure Deduplication in Cloud
    Silambarasan, E.
    Nickolas, S.
    Bhanu, S. Mary Saira
    ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, 2020, 1082 : 537 - 551
  • [22] Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing
    Fatima, Shahin
    Ahmad, Shish
    INTERNATIONAL JOURNAL OF E-COLLABORATION, 2020, 16 (01) : 1 - 15
  • [23] Secure quantum key distribution
    Lo, Hoi-Kwong
    Curty, Marcos
    Tamaki, Kiyoshi
    NATURE PHOTONICS, 2014, 8 (08) : 595 - 604
  • [24] On key distribution in secure multicasting
    Wu, KP
    Ruan, SJ
    Lai, FP
    Tseng, CK
    25TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS - PROCEEDINGS, 2000, : 208 - 212
  • [25] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234
  • [26] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Geeta Sharma
    Sheetal Kalra
    Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234
  • [27] Secure Data Management in the Cloud
    Agrawal, Divyakant
    El Abbadi, Amr
    Wang, Shiyuan
    DATABASES IN NETWORKED INFORMATION SYSTEMS, 2011, 7108 : 1 - 15
  • [28] Secure cloud storage with anonymous deduplication using ID-based key management
    Gharib, Mohammed
    Fazli, MohammadAmin
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (02): : 2356 - 2382
  • [29] Hierarchical group key management for secure data sharing in a cloud-based environment
    Rao, R. Velumadhava
    Selvamani, K.
    Kanimozhi, S.
    Kannan, A.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (12):
  • [30] Machine learning-based intelligent security framework for secure cloud key management
    Ahmad, Shahnawaz
    Mehfuz, Shabana
    Urooj, Shabana
    Alsubaie, Najah
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5571 - 5610