Journal of Engineering and Applied Sciences

Year: 2016
Volume: 11
Issue: 3
Page No. 384 - 389

Enhance Data Transferred Security in Cloud Using Combination of Dynamic Eventual Batch Rekeying with DHKE and AES Encryption Algorithm

Authors : Sura Khalil Abd, S.A.R Al- Haddad, Fazirulhisyam Hashim, Azizol B HJ Abdullahand and Salman Yussof

References

Abd, S.K., S.A.R. Al-Haddad, F. Hashim and A. Abdullah, 2014. A review of cloud security based on cryptographic mechanisms. Proceedings of the International Symposium on Biometrics and Security Technologies, August 26-27, 2014, Kuala Lumpur, Malaysia, pp: 106-111.

Aceto, G., A. Botta, W. De Donato and A. Pescape, 2013. Cloud monitoring: A survey. Comput. Networks, 57: 2093-2115.
CrossRef  |  Direct Link  |  

Baddi, Y. and M.D.E.C. El Kettani, 2013. Key management for secure multicast communication: A survey. Proceedings of the National Security Days Meeting, April 26-27, 2013, Rabat, Morocco, pp: 1-6.

Daemen, J. and V. Rijmen, 2002. The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, New York, USA., ISBN-13: 978-3540425809, Pages: 255.

Dinadayalan, P., S. Jegadeeswari and D. Gnanambigai, 2014. Data security issues in cloud environment and solutions. Proceedings of the World Congress on Computing and Communication Technologies, February 27-March 1, 2014, Trichirappalli, India, pp: 88-91.

Escala, A., G. Herold, E. Kiltz, C. Rafols and J. Villar, 2013. An algebraic framework for Diffie-Hellman assumptions. Proceedings of the 33rd Annual Cryptology Conference on Advances in Cryptology, August 18-22, 2013, Santa Barbara, CA., USA., pp: 129-147.

Gao, J., D. Hu, Y. Wang and Z. Yang, 2007. An efficient rekeying approach for secure multicast communication. Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, September 21-25, 2007, Shanghai, China, pp: 1949-1953.

Govinda, K., E. Sathiyamoorthy and S. Agarwal, 2013. Secure key exchange for cloud environment using cellular automata with triple-DES and error-detection. Int. J. Eng. Technol., 5: 1004-1009.
Direct Link  |  

Je, D.H., H.S. Kim, Y.H. Choi and S.W. Seo, 2014. Dynamic configuration of batch rekeying interval for secure multicast service. Proceedings of the International Conference on Computing, Networking and Communications, February 3-6, 2014, Honolulu, HI., USA., pp: 26-30.

Kori, N.K. and S. Raghuwanshi, 2013. An efficient key management approach for multicasting supported networks. Proceedings of the International Conference on Green Computing, Communication and Conservation of Energy, December 12-14, 2013, Chennai, India, pp: 905-908.

Lee, H., B. Rhee, E. Kim and S. Han, 2008. User-oriented batch processing of individual rekeying. Proceedings of the International Conference on Information Science and Security, January 10-12, 2008, Seoul, South Korea, pp: 38-43.

Li, B., J. Pan, G.P. Li, M.K. Han and Y. Fu, 2009. A secure and efficient distributed batch rekeying protocol for dynamic collaborative groups. Proceedings of the International Conference on Information Engineering and Computer Science, December 19-20, 2009, Wuhan, China, pp: 1-4.

Li, B., Y. Yang, Z. Lu, B. Yuan and T. Long, 2012. Secure distributed batch rekeying algorithm for dynamic group. Proceedings of the IEEE 14th International Conference on Communication Technology, November 9-11, 2012, Chengdu, China, pp: 664-667.

Park, Y.H., D.H. Je, M.H. Park and S.W. Seo, 2014. Efficient rekeying framework for secure multicast with diverse-subscription-period mobile users. IEEE Trans. Mobile Comput., 13: 783-796.
CrossRef  |  

Rhee, M., 2003. Internet Security: Cryptographic Principles, Algorithms and Protocols. John Wiley and Sons, UK., ISBN-13: 9780470862469, pp: 107-111.

Seo, S.H., M. Nabeel, X. Ding and E. Bertino, 2014. An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowledge Data Eng., 26: 2107-2119.
CrossRef  |  Direct Link  |  

Sriprasadh, K. and O. Pandithurai, 2013. A novel method to secure cloud computing through multicast key management. Proceedings of the International Conference on Information Communication and Embedded Systems, February 21-22, 2013, Chennai, India, pp: 305-311.

Tari, Z., 2014. Security and privacy in cloud computing. IEEE Cloud Comput., 1: 54-57.
CrossRef  |  Direct Link  |  

Tari, Z., X. Yi, U.S. Premarathne, P. Bertok and I. Khalil, 2015. Security and privacy in cloud computing: Vision, trends and challenges. IEEE Cloud Comput., 2: 30-38.
CrossRef  |  

Vasanthi, A. and T. Purusothaman, 2014. Optimizing batch rekeying interval for secure group communication based on queuing model. J. Comput. Sci., 10: 325-329.
Direct Link  |  

Veltri, L., S. Cirani, G. Ferrari and S. Busanelli, 2013. Batch-based group key management with shared key derivation in the internet of things. Proceedings of the 9th International Wireless Communications and Mobile Computing Conference, July 1-5, 2013, Sardinia, pp: 1688-1693.

Xiao, Z. and Y. Xiao, 2013. Security and privacy in cloud computing. IEEE Commun. Surv. Tutorials, 15: 843-859.
CrossRef  |  Direct Link  |  

Yao, A.C.C. and Y. Zhao, 2014. Privacy-preserving authenticated key-exchange over internet. IEEE Trans. Inform. Forensics Secur., 9: 125-140.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved