Secure Group Key Sharing Protocols and Cloud System

Secure Group Key Sharing Protocols and Cloud System

DOI: 10.4018/978-1-5225-2255-3.ch145
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. Secure and reliable communications have become critical in modern computing. The centralized services like e-mail and file sharing can be changed into distributed or collaborated system through multiple systems and networks. Basic cryptographic requirements such as data confidentiality, data integrity, authentication and access control are required to build secure collaborative system in the broadcast channel. For several groupware applications like voice & video conferences, distributed computation over the insecure network, developing an efficient group key agreement protocol for secure communication is required in internet. According to the recent rule released by Health and Human Services (HHS), healthcare data can be outsourced to cloud computing services for medical studies. The aim of this study is to provide the details about secure group data sharing protocols available and how it will be applicable in healthcare cloud applications to share data securely over healthcare cloud.
Chapter Preview
Top

Background

Group key agreement protocols allow that all the members agree on the same group key, for secure group communication, and the basic security criteria must be hold. In 1994 Mike Burmester and Yvo Desmedt Proposed A Secure and Efficient Conference Key Distribution System (BD Protocol), In 2000 Group Diffie Hellman (GDH) was proposed by Steiner et.al., Skinny Tree (STR) Wong et al. 2000, ID-AGKA (Identity based authenticated group key agreement protocol) by K C Reddy and Divya Nalla in 2002, Kim et al. proposed TGDH (Tree Based Group Diffie Hellman) in 2004, In 2006 CCEGK was proposed by Szheng, Moreover in 2009 QGDH (Queue Based Group Diffie Hellman) by Hong S.

After understanding the real time issues in real time groupware applications like voice & video conferences, distributed computation over the insecure network.

Key Terms in this Chapter

Computational Complexity: A mathematical characterization of the difficulty of a computing group key which describes the resources required by a computing machine to compute the group key. The mathematical study of such characterizations is called computational complexity theory and is important in many branches of theoretical computer science, especially cryptography.

Proxy Re-Encryption: Proxy re-encryption schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so that it may be decrypted by another.

Proxy Signature: Proxy signature, which allows an original signer to delegate his/her signing right to another party (or proxy signer), is very useful in many applications.

Cloud Computing System: Cloud computing is a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications rather than a direct connection to a server.

Complete Chapter List

Search this Book:
Reset