Secure Group Key Sharing Protocols and Cloud System

Secure Group Key Sharing Protocols and Cloud System

DOI: 10.4018/978-1-5225-7492-7.ch007
(Individual Chapters)
No Current Special Offers


Cloud computing has been envisioned as the next-generation architecture of IT enterprise. Secure and reliable communications have become critical in modern computing. The centralized services like e-mail and file sharing can be changed into distributed or collaborated system through multiple systems and networks. Basic cryptographic requirements such as data confidentiality, data integrity, authentication, and access control are required to build secure collaborative systems in the broadcast channel. For several groupware applications like voice and video conferences, distributed computation over the insecure network, developing an efficient group key agreement protocol for secure communication is required in internet. According to the recent rule released by health and human services (HHS), healthcare data can be outsourced to cloud computing services for medical studies. The aim of this study is to provide the details about secure group data sharing protocols available and how it will be applicable in healthcare cloud applications to share data securely over healthcare cloud.
Chapter Preview


Group key agreement protocols allow that all the members agree on the same group key, for secure group communication, and the basic security criteria must be hold. In 1994 Mike Burmester and Yvo Desmedt Proposed A Secure and Efficient Conference Key Distribution System (BD Protocol), In 2000 Group Diffie Hellman (GDH) was proposed by Steiner, Skinny Tree (STR) Wong et al. 2000, ID-AGKA (Identity based authenticated group key agreement protocol) by K C Reddy and Divya Nalla in 2002, Kim et al. proposed TGDH (Tree Based Group Diffie Hellman) in 2004, In 2006 CCEGK was proposed by Szheng, Moreover in 2009 QGDH (Queue Based Group Diffie Hellman) by Hong S.

After understanding the real time issues in real time groupware applications like voice & video conferences, distributed computation over the insecure network.

Complete Chapter List

Search this Book: