2013 International Conference on Information Communication and Embedded Systems (ICICES) 2013
DOI: 10.1109/icices.2013.6508325
|View full text |Cite
|
Sign up to set email alerts
|

A novel method to secure cloud computing through multicast key management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…It will provide dynamic session key where change over the period of time. At whatever point another client into the cloud, the new-fangled key will be created [12]. After the period the client will recharge the key for the following use of the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…It will provide dynamic session key where change over the period of time. At whatever point another client into the cloud, the new-fangled key will be created [12]. After the period the client will recharge the key for the following use of the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…The federated identity management and hierarchical identity based cryptography (HIBC) in the cloud depicts how can the system generate and distribute the public and private keys to users and servers. compared with the current Ws-Security approach, the proposed approach in this paper has advantages in simplifying public key distribution and reducing [SOAP] header size [7].…”
Section: Survey Of Existing Key Management Frame Work For Cloud Commentioning
confidence: 99%
“…Table 1 describes comparative study based on data integrity, authentication, scalability and data confidentiality in various literatures. In paper [1] federated key management and [7] multicast key management approach is discussed which provides authentication, data confidentiality with moderate scalability factors. In paper [10,11] and [13] by considering Elliptic Curve Cryptography approach for security in data forwarding, secure user authentication and private data storage in cloud computing which provides data integrity, authentication, data confidentiality and moderate scalability factors.…”
Section: B Elliptic Curve Encryption/decryptionmentioning
confidence: 99%