Hierarchical group key management for secure data sharing in a cloud‐based environment

In cloud environment, the importance of security for the outsourced data has increased much, since the data is maintained and controlled by the semi‐trusted third‐party cloud providers. Data Security is one of the major factors to be considered in group data sharing. Using the secret key, the entire file is encrypted directly in a conventional security framework; however, in a cloud‐based environment for group mechanism, this framework cannot be applied as there is a problem of key distribution. This research paper proposes an efficient hierarchical‐based group key mechanism for a cloud‐based environment. This proposed system relies on Key Distribution Server (KDS), which performs cryptographic key operations for securing the data in the cloud. Also, this system uses logical key hierarchy (LKH) protocol to maintain hierarchical tree for scalability. The group key is generated using the group member secret values and a secret value assigned by the KDS server. Performance analysis of this system shows that the proposed key management system is more efficient and much suitable for cloud environment.

[1]  V. Vaidehi,et al.  Secure Group Key Management Scheme for Multicast Networks , 2010, Int. J. Netw. Secur..

[2]  Jian Liu,et al.  Reliable and confidential cloud storage with efficient data forwarding functionality , 2016, IET Commun..

[3]  Shaozhang Niu,et al.  An Effective and Secure Access Control System Scheme in the Cloud , 2015 .

[4]  Yacine Challal,et al.  Group Key Management Protocols: A Novel Taxonomy , 2008 .

[5]  Chanboon Sathitwiriyawong,et al.  High-availability decentralized cryptographic multi-agent key recovery , 2014, Int. Arab J. Inf. Technol..

[6]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Muhammad Torabi Dashti,et al.  A Hybrid PKI-IBC Based Ephemerizer System , 2007, SEC.

[8]  Mustaque Ahamad,et al.  Multicast communication in distributed systems , 1990 .

[9]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[10]  Guy Leduc,et al.  A survey of optimal network congestion control for unicast and multicast transmission , 2006, Comput. Networks.

[11]  Xiaozhou Li,et al.  Batch rekeying for secure group communications , 2001, WWW '01.

[12]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[13]  Yacine Challal,et al.  Scalable Delay-constrained Multicast Group Key Management , 2008, Int. J. Netw. Secur..

[14]  Lawrence Harte Introduction to Data Multicasting, IP Multicast Streaming for Audio and Video Media Distribution , 2008 .

[15]  Heba Kamal Aslan A scalable and distributed multicast security protocol using a subgroup-key hierarchy , 2004, Comput. Secur..

[16]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[17]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[18]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[19]  Tao Jiang,et al.  Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation , 2016, IEEE Transactions on Computers.

[20]  Gene Tsudik,et al.  Communication-Efficient Group Key Agreement , 2001, SEC.

[21]  Bharat K. Bhargava,et al.  Secure and efficient access to outsourced data , 2009, CCSW '09.

[22]  Xinwen Zhang,et al.  CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud , 2012, ASIACCS '12.

[23]  Jiannong Cao,et al.  Scalable key management for secure multicast communication in the mobile environment , 2006, Pervasive Mob. Comput..

[24]  Elisa Bertino,et al.  An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds , 2014, IEEE Transactions on Knowledge and Data Engineering.

[25]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[26]  Jin-Hee Cho,et al.  On optimal batch rekeying for secure group communications in wireless networks , 2008, Wirel. Networks.

[27]  Wei Song,et al.  A practical group key management algorithm for cloud data sharing with dynamic group , 2016, China Communications.

[28]  Shahaboddin Shamshirband,et al.  Incremental proxy re-encryption scheme for mobile cloud computing environment , 2013, The Journal of Supercomputing.

[29]  Shueng-Han Gary Chan,et al.  Key management approaches to offer data confidentiality for secure multicast , 2003 .

[30]  Wen-Guey Tzeng,et al.  Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[31]  Yu Zhou,et al.  An extension of secure group communication using key graph , 2006, Inf. Sci..