Abstract
The invention of cloud computing offers elastic storage services in pay-per-use policies and hence organizations store their data in cloud servers. A cybercriminal can hack the sensitive documents in the cloud and sell it for mere profit or a cloud server may be curious to learn the contents of documents. Though many works for securely distributing the keys to the mobile cloud users have been proposed, they are vulnerable to attacks and incur high computational and communication overheads. This research work addresses the security issues pertaining to secure group communication during the file upload and download over public clouds. This research is a pioneering attempt to securely transfer the keys, upload and download the documents from the cloud. The security analysis ascertains the effectiveness of the protocol and the experimental results confirm the efficiency of the proposed protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bertino, E., Bonatti, A., Ferrari, E.: TRBAC: a temporal Role-Based Access Control Model. ACM Trans. Inf. Syst. Secur. 4(3), 191–233 (2001)
Joshi, J.B.D., Rafae, B., Elisa, B., Arif, G.: Access-control language for multi-domain environment. IEEE Trans. Internet Comput. 8(6), 40–50 (2004)
Barker, S.: Action-status access control. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pp. 195–204. ACM, Sophia Antipolis, France (2007)
Poovendran, R., Baras, J.S.: An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Trans. Inf. Theory 47, 2824–2834 (2001)
Kim, Y., Perring, A., Tsudik, G.: Group key agreement efficient in coummunication. IEEE Trans. Comput. 53(7), 905–921 (2004)
Drira, K., Seba, H., Kheddouci, H.: ECGK: an efficient clustering scheme for group key management in MANET. J. Comput. Communications 33(9), 1094–1107 Elsevier (2010)
Naranjo, J.A.M., Lopez-Ramosz, J.A., Casado.L.G.: A suite of algorithms for key distributions and authentication in centralized secure multicast environments. J. Computational Appl. Math. 236(12), 3042–3051. Elsevier (2012)
Vijayakumar, P., Bose, S., Kannan, A.: Chinese remainder theorem based centralized group key management for secure multicast communication. IET Inf. Secur. IET 8(3), 179–187 (2014)
Jeong, Y.S., Kim K.S., Kim, Y.T., Park, G.C., Lee, S.H.: A key management protocol for securing stability of an intermediate node in wireless sensor networks. In: 8th International Conference on Computer and Information Technology, pp. 471–476. IEEE (2008)
Kim, J.Y., Choi, H.K.: Improvements on Sun et al’s conditional access systems in Pay-TV broadcasting systems. IEEE Trans. Multimed. 12, pp. 337–340 (2010)
Nabeel, M., Shang, N., Berino, E.: Privacy preserving policy-based content sharing in public clouds. IEEE Trans. Knowl. Data Eng. 25(11), 2602–2614 (2013)
Sridhar, S., Smys, S.: A hybrid multilevel authentication scheme for private cloud environment. In: 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1–5. IEEE (2016)
Praveena, A., Smys, S.: Ensuring data security in cloud based social networks. In: Electronics. In: International conference of Communication and Aerospace Technology (ICECA), vol. 2, pp. 289–295. IEEE (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Milton Ganesh, S., Manikandan, S.P. (2020). ECDSEC: An Efficient Group Key Management Scheme for Secure Data Sharing Among Mobile Users in Cloud Environments. In: Smys, S., Senjyu, T., Lafata, P. (eds) Second International Conference on Computer Networks and Communication Technologies. ICCNCT 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 44. Springer, Cham. https://doi.org/10.1007/978-3-030-37051-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-37051-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37050-3
Online ISBN: 978-3-030-37051-0
eBook Packages: EngineeringEngineering (R0)