Centralized key distribution protocol using identity-based encryption techniques in cloud computing environments

S Ambika, AS Anakath, S Rajakumar… - … Data Management for …, 2023 - taylorfrancis.com
Secure Data Management for Online Learning Applications, 2023taylorfrancis.com
Currently, a group gathering is performed as an online meet conducted in online meeting
platforms such as Zoom, Google Meet, Go To Meeting, Webex Meet, or Microsoft Teams
among others. In none of the cases, do all members join the gathering at the same time.
Group communication becomes inevitable nowadays and group size is also increasing. This
leads to issues pertaining to the scalability characteristics of distributed systems. As the
group size grows gradually, the size of the key domain also expands proportionately. It is a …
Currently, a group gathering is performed as an online meet conducted in online meeting platforms such as Zoom, Google Meet, Go To Meeting, Webex Meet, or Microsoft Teams among others. In none of the cases, do all members join the gathering at the same time. Group communication becomes inevitable nowadays and group size is also increasing. This leads to issues pertaining to the scalability characteristics of distributed systems. As the group size grows gradually, the size of the key domain also expands proportionately. It is a difficult and challenging task to filter unauthorized persons and those hacking the data in the distributed network. The storage size for maintaining this large quantum of keys becomes a disputed issue in a group conversation environment. This issue also occurs in new user registration to enter the group, as well as in group members leaving the group, because during these two events, key updation must be performed by regeneration of the group key. Applications based on multi-cast as well as multi-media key distribution is the very big ongoing issue, and the certificate authority (CA) is responsible for transmitting the key in a secure way to the end entity. However, of primary concern is the security of such data being transferred through the distributed clouds characterized in a centralized configuration. In a group communication environment, security threats arise when new users join the system as well as when existing users remove themselves from the gathering. At this stage utmost care must be taken while a new user’s entry occurs, or users depart from the system. In order to resolve the previous issues based on the computational and storage complexity in the certificate authority as well as the end user, it becomes imperative to initiate a method. A group key plays an essential and important role in proving its robustness, and its use for encrypting the data needs to be secured. At the event of a user entering the group conversation, this group key identifies the quorum of members present in the group as well as identifies the state of the group, even if a member exits the chat for any reason. It is possible that at any instant of time, changes may occur in group size and the group key updates the group information inevitably. Safeguarding and securely distributing the group key is an important issue to be considered in achieving the security of group communication. In this chapter, we present a centralized key distribution protocol using attribute-based encryption to provide security for the shared data pertaining to a group. This proposed protocol provides superior security and improved efficiency in generating and distributing group keys in a distributed environment.
taylorfrancis.com
以上显示的是最相近的搜索结果。 查看全部搜索结果