Key Trees Combining Algorithm for Overlapping Resource Access Members
نویسندگان
چکیده
In cloud computing environment, resources are accessed by multiple members. Resources may be considered as VM, CPU, Storage etc. Group key management required when multiple members in group accesses the resources securely. In existing group key management, separate key trees are formed even if members are common in another group to access the resources. The solution to this is to form the combined key trees for resources which containing overlapping members. Through the analysis it is observed that computational overhead is decreased by 22% if we combine the key trees than separate key trees for each resource.
منابع مشابه
Ternary Tree Based Approach For Accessing the Resources by Overlapping Members in Cloud Computing
In cloud computing, immediate access of resources is important due to cost incurred to customer by pay per use model of cloud computing. Usually resource is protected by using cryptography technique. The resource may be shared by multiple members in group. There can be overlapping members to access the multiple resources. Group key management is important to form the group key to access the res...
متن کاملAnalysis of Algorithms for Overlapping Resource Access Members in Cloud Computing
In Cloud computing environment, resources include virtual machine, CPU and Storage. These resources are accessed by tenants. Group key may be used to access the resources securely. Group key is constructed using tree by considering tenants in a group. In existing scenario, different key trees are formed even if tenants are common among multiple groups to access the resources. This paper address...
متن کاملAn Adaptive Clustering-based Resource Discovery Scheme for Large Scale MANETs
An increasing number of smart mobile devices offering the ability to perform various types of ubiquitous computation are emerging as large computer networks with an unprecedented scale. Large Scale Mobile Ad Hoc Networks (MANETs) place strong challenges on many aspects of network modeling, deployment, protocols, and resource discovery. Existing policies and techniques in MANETs need to be scale...
متن کاملUsing Multi-Encryption to Provide Secure and Controlled Access to XML Documents
Sharing XML documents within decentralized and distributed computing environments requires mechanisms to facilitate controlled and secure access to these documents. This includes the ability to make selective (parts of) documents available to users in multiple, possibly overlapping roles. One common solution involves the use of multiple encryption keys to enforce a defined access control policy...
متن کاملIdentifying and Prioritizing the Key Factors of ERP System Implementation in Chaharmahal and Bakhtiari Saderat Bank using Theme Analysis Method and Fuzzy Dematel
The purpose of this study was to identify the key factors in implementing the organization's resource planning system in Chaharmahal and Bakhtiari Saderat Bank using theme analysis method. This research was a type of qualitative research that was done in an applied way. The research population consists of 15 experts and specialist in system implementation, resource planning in Chaharmahal and B...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2016