An Efficient Group Authentication Mechanism Supporting Key Confidentiality, Key Freshness And Key Authentication In Cloud Computing

被引:0
作者
Nair, Nikhitha K. [1 ]
Navin, K. S. [2 ]
机构
[1] Sarabhai Inst Sci & Technol, Dept Comp Sci & Engn, Thiruvananthapuram 695543, Kerala, India
[2] LBS Inst Technol Women, Dept Comp Sci & Engn, Thiruvananthapuram 695012, Kerala, India
来源
2015 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY, INFORMATION AND COMMUNICATION (ICCPEIC) | 2015年
关键词
Group Authentication; Key Freshness; Encryption; Key Confidentiality; Cloud computing; USER AUTHENTICATION; NETWORKS; SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A Group authentication emphasis on communication between the members of a group and then authenticates the members. The main purpose of group communication is to share and exchange ideas and messages with different members of the group. The messages are sent to each other in encrypted form to enhance security. The group manager has the responsibility of overall control over the group. A group key is there for each group which generates the session keys which are used by the group members to share the secret messages.
引用
收藏
页码:288 / 292
页数:5
相关论文
共 10 条
  • [1] Balancing Revocation and Storage Trade-Offs in Secure Group Communication
    Bruhadeshwar, Bezawada
    Kulkarni, Sandeep S.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) : 58 - 73
  • [2] Self-Organized Authentication in Mobile Ad-Hoc Networks
    Caballero-Gil, Pino
    Hernandez-Goya, Candelaria
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2009, 11 (05) : 509 - 517
  • [3] Two-Factor User Authentication in Wireless Sensor Networks
    Das, Manik Lal
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1086 - 1090
  • [4] Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications
    Harn, Lein
    Ren, Jian
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (07) : 2372 - 2379
  • [5] Harn Lein, 2013, IEEE T COMPUTERS, V62
  • [6] Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture
    Ku, WC
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 2005, 16 (04): : 1002 - 1005
  • [7] Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService
    Park, Hyun-A
    Hong, Jong Wook
    Park, Jae Hyun
    Zhan, Justin
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (06) : 824 - 837
  • [8] Multi-User Broadcast Authentication in Wireless Sensor Networks
    Ren, Kui
    Yu, Shucheng
    Lou, Wenjing
    Zhang, Yanchao
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (08) : 4554 - 4564
  • [9] Survey of security services on group communications
    Sakarindr, P.
    Ansari, N.
    [J]. IET INFORMATION SECURITY, 2010, 4 (04) : 258 - 272
  • [10] Password memorability and security: Empirical results
    Yan, J
    Blackwell, A
    Anderson, R
    Grant, A
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (05) : 25 - 31