z-logo
open-access-imgOpen Access
Ternary Tree Based Approach For Accessing the Resources By Overlapping Members in Cloud Computing
Author(s) -
Amar Buchade,
Rajesh Ingle
Publication year - 2017
Publication title -
international journal of electrical and computer engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.277
H-Index - 22
ISSN - 2088-8708
DOI - 10.11591/ijece.v7i6.pp3593-3601
Subject(s) - computer science , key (lock) , tree (set theory) , cloud computing , overhead (engineering) , key management , distributed computing , public key cryptography , resource (disambiguation) , key generation , group key , ternary operation , cryptography , computer network , computer security , operating system , encryption , mathematics , mathematical analysis , programming language
In cloud computing, immediate access of resources is important due to cost incurred to customer by pay per use model of cloud computing. Usually resource is protected by using cryptography technique. The resource may be shared by multiple members in group. There can be overlapping members to access the multiple resources. Group key management is important to form the group key to access the resource. Group key formation time is crucial for immediate access of protected resource in cloud computing. Thus ternary tree based approach is proposed to form the key for overlapping members accessing resources. Membership event such as join and leave also considered. Through the analysis, it is found that computational overhead is reduced by 23% if ternary key trees are combined than independent ternary key trees. It is also observed that combined ternary key tree outperforms the combined binary key tree approach for group key formation by considering overlapping members. Security requirement analysis of group membership for key formation is also provided in the paper.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here