Dynamic Group Key Management for Efficient Fog Computing

Author(s):  
Jiyoung Lim ◽  
Inshil Doh ◽  
Kijoon Chae
Processes ◽  
2020 ◽  
Vol 8 (10) ◽  
pp. 1300
Author(s):  
Mai Trung Dong ◽  
Haitao Xu

In group key management, the implementation of encryption often fails because multicast communication does not provide reliable linkage. In this paper, a new group key management scheme is proposed for multicast communication in fog computing networks. In the proposed scheme, any legal fog user belonging to a fog node will be able to decrypt a ciphertext encrypted by a secret shared key. The shared secret key is divided into key segments. In the rekeying operation process, each key segment is split into two factors with its shared production mechanism. The key updates are required to belong to the fog provider or the group management device. Fog users will have independent key segments unchanged. Then, the cost, the message of rekeying, and the dependence on credible channels will be decreased. This method can resist collusion attacks and ensure backward security and forward security, even if the number of users leaving is larger than the threshold value. Our scheme is also suitable for untrusted affiliate networks.


2016 ◽  
Vol 13 (6) ◽  
pp. 205-216 ◽  
Author(s):  
Wei Song ◽  
Hua Zou ◽  
Haowen Liu ◽  
Jun Chen

Author(s):  
Dr. Dhanaraj Cheelu ◽  
K. V. Uma Maheswari

Data sharing is increasingly important for many users and sometimes an essential requirement, especially for industries and society’s used to gain proceeds. Sharing group resource among cloud users is a major problem, still the data privacy leak. The existing system Group Key Management method used for sharing Key Generation and distribution in the group member or users. Sometimes change to user one group to another group, the group key to enable authenticated users to access the files securely and efficiently is still a challenging problem. This problem to avoid that sharing data in group using the Time Based Group Key Management (TGKM) techniques for cryptographic cloud storage application , which Conditional Identity Based Broadcast Proxy Re-Encryption (CIBPRE) used to transforming the data’s(files) major process in cloud server. To Key Generation method for user a time based dynamic group Key which capably to make stronger in cloud security. Generally, security and performance evaluated that the proposed scheme is highly efficient and satisfies the security requirements for cloud based application.


Sign in / Sign up

Export Citation Format

Share Document