Block Design-based Key Agreement for Group Data Sharing in Cloud Computing

Data sharing in cloud computing permits multiple participants to freely share the cluster knowledge that improves the efficiency of labor in cooperative environments and has widespread potential applications. However, some way to form sure the safety of information sharing among and therefore the thanks to with efficiency share the out sourced information in Associate in Nursing extremely cluster manner area unit formidable challenges. Note that key agreement protocols have contend a really necessary role in secure and economical cluster knowledge sharing in cloud computing. During this paper, by taking advantage of the Centro symmetric balanced incomplete block vogue (SBIBD), we tend to gift a unique block design-based key agreement protocol that supports multiple participants, which can exile extend the number of participants in Associate in Nursing extremely cloud surroundings the structure of the block style. Supported the planned cluster knowledge sharing model, we've a bent to gift general formulas for generating the common conference key K for multiple participants. Note that by taking advantage of the block style, the process complexness of the planned protocol linearly can increase with the number of participants and additionally the communication quality is greatly reduced. To boot, the fault tolerance property of our protocol permits the cluster knowledge sharing in cloud computing to face up to different key attacks, that's analogous to protocol.

[1]  Tao Xiang,et al.  Secure cloud storage meets with secure network coding , 2016, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[2]  Xun Yi Identity-based fault-tolerant conference key agreement , 2004, IEEE Transactions on Dependable and Secure Computing.

[3]  Ratna Dutta,et al.  Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract) , 2003, INDOCRYPT.

[4]  Jian Shen,et al.  Identity-based key agreement protocol employing a symmetric balanced incomplete block design , 2012, Journal of Communications and Networks.

[5]  Alfred Menezes,et al.  Key Agreement Protocols and Their Security Analysis , 1997, IMACC.

[6]  Jian Shen,et al.  An Efficient RFID Authentication Protocol Providing Strong Privacy and Security , 2016 .

[7]  Hassan M. Elkamchouchi,et al.  An efficient protocol for authenticated key agreement , 2011, 2011 28th National Radio Science Conference (NRSC).

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.