ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

EFFICIENT ACCESS CONTROL SECURITY ASSURANCE IN CLOUD COMPUTING USING BGKM WITH SHAMIR

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 12)

Publication Date:

Authors : ;

Page : 568-573

Keywords : Management; Trusted Authority for Key Sharing.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing relies on restricting discussing of resources to obtain coherence and financial systems of range, just like an application (like the power grid) over a network. The secure transmitting of details among working together customers should be efficient as well as versatile in order to support accessibility management designs with different granularity levels for different kinds of programs such as protected team interaction, secure powerful co nference meetings, and the selective or hierarchical accessibility management published details. Accessibility management of short end users in cloud computing using Attribute - Set - Based - Encryption (ASBE) with an requested structure of clients is not prefer able for multi user access control in cloud computing. In this paper the first provably protected Broadcast Group Key Management (BGKM) plan is used where each user in a team stocks a key with the reliable key server and the following re - keying for be a pa rt of or leaving of customers’ needs only one transmitted concept. Out plan meets all the specifications set down for an effective GKM plan and needs no change to key stocks current customers have. We evaluate the security of our BGKM plan and evaluate it with the current BGKM techniques

Last modified: 2015-12-26 16:46:06