Generation of multiple key based on monitoring the user behavior

10Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is the recent technology used to share and store the computer resources rather than having resources in local server to maintain the application. Though cloud is used for a large amount of storage, there is no security in cloud. In general, all the groups have data owners and data members each should have user name, key, and group key. If a user shifts from one group to another, they can easily access the information from another group. It leads to a security problem. In order to increase security and confidentiality, author generates the new group key via Email using Diffie-Hellman algorithm. In case of a new user is added or an existing user leaves themselves from the group. The data members have to get permission from the data owners in case of any data updation. If the user misbehaves, i.e., (DDOS) attack, data owner or cloud terminates the user from the group. The updated key is sent to the users through Email. This mechanism significantly improves security in cloud computing.

Author supplied keywords

Cite

CITATION STYLE

APA

Palaniappan, S., Kirubakaran, S., Parthipan, V., & Rinesh, S. (2020). Generation of multiple key based on monitoring the user behavior. In Lecture Notes in Networks and Systems (Vol. 89, pp. 391–397). Springer. https://doi.org/10.1007/978-981-15-0146-3_37

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free