Group Key Management Protocol for File Sharing on Cloud Storage
نویسندگان
چکیده
منابع مشابه
Aggregate Key Sharing Mechanism for Sharing Data in Group via Cloud Storage
In cloud storage data sharing is an important utility. Most of the users attracted by cloud storage because of its numerous benefits. The idea of Key Aggregate Searchable Encryption is build through a concrete KASE scheme. In this scheme data owner distribute single trapdoor to the cloud. In this paper , we used multi cloud for storing & accessing the large amount of data because in cloud envir...
متن کاملKey Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
ISSN: 2231-5381 http://www.ijettjournal.org Page 95 ABSTRACT: Cloud computing provides the flexible architecture to share the applications as well as the other network resources. Cloud storage enables networked online storage. Key management and key sharing plays the main role in the data sharing concept of cloud computing. While cloud computing brings new and challenging security threats to th...
متن کاملKey Aggregate Searchable Encryption for Group Data Sharing Via Cloud Data Storage
the ability of preferentially sharing encrypted data with unlike users through public cloud storage might really ease security distress, by possibility data disclose in the cloud. A key test to design such encryption idea lies in the well-organized management encryption keys. The preferred flexibility of allocating any group documents with any group of users by attaining weightage different enc...
متن کاملSecure Key Sharing for Group Communication under Community Cloud
The cloud is one of the most discussed topics among IT professionals today, and organizations are increasingly exploring the potential benefits of using cloud computing or solutions for their businesses. In our modern world people join hands together to form groups and that forms communities through which the ability of one can enhance by communicating with others. In order to satisfy these peo...
متن کاملOn The Group Key Transfer Protocol using Secret Sharing ⋆
Recently, some group key transfer protocols are proposed using Shamir’s secret sharing, which are claimed to be secure to resist the insider attack and the outsider attack. In fact, some claims are not really true. In this paper, we review the recently proposed protocol by Yuan et al. and the cryptanalysis presented by Olimid, then give the improved version to guarantee the security and low com...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2019.2963782