82
Views
7
CrossRef citations to date
0
Altmetric
Articles

Fault-Tolerant Based Group Key Servers with Enhancement of Utilizing the Contributory Server for Cloud Storage Applications

&

REFERENCES

  • D. Wallner, E. Harder, and R. Agee, “Key management for multicast: issues and architectures,” Internet Draft Report, Jun. 1999. https://doi.org/10.17487/RFC2627
  • Y. Vijay Kumar, A. Anshul, V. Shekhar, and S. Venkatesan, “Private computation of the Schulze voting method over the cloud,” Cluster. Comput., Vol. 23, pp. 2517–2531, Dec. 2019.
  • N. Mohanapriya, G. Kousalya, and P. Balakrishnan, “An optimal time-based resource allocation for biomedical workflow applications in cloud,” IETE. J. Res., Mar. 2020. https://doi.org/10.1080/03772063.2020.1724521
  • H. Wee, C. Haitham, and S. Zhili, “Scalable balanced batch rekeying for secure group communication,” Comput. Secur., Vol. 25, no. 4, pp. 265–273, Jun. 2006.
  • X. Zheng, C. T. Huang, and M. Manton, “Chinese remainder theorem based group key management,” in Association for computing machinery proc. 45th annual southeast regional, march 23-24, Mar. 2007, pp. 266–271.
  • D. Xiao, J. Shu, W. Xue, Z. Liu, and W. Zheng, “Design and implementation of a group key server-based cryptographic file system,” Chin. J. Comput., Vol. 31, no. 4, pp. 600–610, Apr. 2008.
  • L. Xuefeng, Z. Yuqing, W. Boyang, and Y. Jingbo, “Mona: secure multi-owner data sharing for dynamic groups in the cloud,” IEEE Trans. Parallel Distrib. Syst., Vol. 24, no. 6, pp. 1182–1191, Jun. 2013.
  • D. H. Je, K. Han, C. Yoon, and S. W. Seo, “Dynamic configuration of batch rekeying interval for secure multicast service,” in International Conference on computing, Networking and communications, Apr. 2014, pp. 26–30.
  • W. Jianghong, L. Wenfen, and H. Xuexian, “Secure data sharing in cloud computing using revocable-storage identity-based encryption,” IEEE Transactions on Cloud Computing, Vol. 6, no. 4, pp. 1136–1148, Mar. 2016.
  • Y. Chen, and T. Wen, “Group key management with efficient rekey mechanism: A semi- stateful approach for out-of-synchronized members,” Comput. Commun., Vol. 98, no. 15, pp. 31–42, Aug. 2016.
  • Y. Hanatani, N. Ogura, Y. Ohba, L. Chen, and S. Das. “Secure Multicast Group Management and Key Distribution in IEEE 802.21”, Security Standardisation Research Springer International Publishing, pp. 227-243, Nov. 2016.
  • G. Cheng, L. Ningqi, A. B. Zakirul, J. Yingmo, C. Yuanfang, F. Bin, and A. Muhammad, “Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage,” Future Gener. Comput. Syst., Vol. 84, pp. 190–199, Dec. 2017.
  • H. Y. Lin, H. Meng, and L. Kuan, “The cluster-based key management mechanism with secure data transmissions scheme in wireless sensor networks,” in International Conference on applied mechanics and mechanical automation, 2017.
  • S. K. Hafizul, and G. P. Biswas, “A pairing-free identity-based two- party authenticated key agreement protocol for secure and efficient communication,” Journal of King Saud University-Computer and Information Sciences, Vol. 29, no. 1, pp. 63–73, Jan. 2017.
  • K. Vinod, K. Rajendra, and S. K. Pandey, “A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem,” Journal of King Saud University - Computer and Information Sciences, Vol. 23, no. 9, pp. 1081–1094, Nov. 2020.
  • S. Athmani, A. Bilami, and D. E. Boubiche, “EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs,” Future Gener. Comput. Syst., Vol. 92, pp. 789–799, Mar 2019.
  • W. Trappe, K. J. Ray, and W. Yuke, “Resource-aware conference key establishment for heterogeneous networks,” IEEE/ACM Trans. Networking, Vol. 13, pp. 134–146, Mar. 2005.
  • Z. Shanyu, M. David, and A. F. Jim, “A communication–computation efficient group key algorithm for large and dynamic groups,” Comput. Netw., Vol. 51, pp. 69–93, Jan. 2007.
  • G. Xiaozhuo, Y. Jianzu, Y. Jing, and L. Julong, “Join- tree-based contributory group Key management,” in IEEE International conference On high performance computing And communications, Oct. 2008.
  • M. Abbas, H. Fazirulhisyam, and O. Mohamed, “Lightweight decentralized multicast–unicast key management method in wireless IPv6 networks,” J. Netw. Comput. Appl., Vol. 42, pp. 59–69, Apr. 2014.
  • Z. Lei, “Key management scheme for secure channel establishment in Fog computing,” IEEE Transactions on Cloud Computing, Mar 2019. https://doi.org/10.1109/TCC.2019.2903254
  • Q. Zhang, X. Wang, J. Yuan, L. Liu, R. Wang, H. Huang, and Y. Li, “A hierarchical group key agreement protocol using orientable attributes for cloud computing,” Inf. Sci. (Ny), Vol. 480, pp. 55–69, Apr.2019.
  • S. Rafaeli, and H. David, “A survey of key management for secure group communication,” ACM. Comput. Surv., Vol. 35, no. 3, pp. 309–329, Sep. 2003.
  • W. Diffie, and M. E. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory, Vol. 22, no. 6, pp. 644–654, Nov. 1976.
  • Y. Lindell, and K. Jonathan. Introduction to modern cryptography. Florida: Chapman and Hall/ CRC, 2014.
  • M. Wiener, “Cryptanalysis of short RSA secret exponents,” IEEE Trans. Inf. Theory, Vol. 36, pp. 553–558, May 1990.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.