M. Li, Ruijie Zhang, Xiang Du, Min Zhou, Luqi Yan, Jiacheng Song
{"title":"A Survey on Group Key Agreement Protocols in Cloud Environment","authors":"M. Li, Ruijie Zhang, Xiang Du, Min Zhou, Luqi Yan, Jiacheng Song","doi":"10.1109/IC3.2018.00-38","DOIUrl":null,"url":null,"abstract":"This survey is aimed at reviewing the group key agreement protocols in cloud environment. These protocols are given a classification, which are group key agreement protocol, triple-party protocol and double-party protocol, according to the number of users participating in the agreement. Then we give a summary of these proposed key agreement protocols based on the classification. After performing analysis on security and performance of these key agreement protocols respectively, a comment on each category is made and given in this paper. Based on which, it is unmistakably that Odelu et al.'s protocol in [47] shows the best performance both in security and efficiency, while Tseng et al.'s protocol in [45] reveals unsatisfying outcome. Finally, discussion and evaluation of group key agreement protocols in cloud is given in a generalized way to provide a reference for further study.","PeriodicalId":236366,"journal":{"name":"2018 1st International Cognitive Cities Conference (IC3)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 1st International Cognitive Cities Conference (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2018.00-38","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This survey is aimed at reviewing the group key agreement protocols in cloud environment. These protocols are given a classification, which are group key agreement protocol, triple-party protocol and double-party protocol, according to the number of users participating in the agreement. Then we give a summary of these proposed key agreement protocols based on the classification. After performing analysis on security and performance of these key agreement protocols respectively, a comment on each category is made and given in this paper. Based on which, it is unmistakably that Odelu et al.'s protocol in [47] shows the best performance both in security and efficiency, while Tseng et al.'s protocol in [45] reveals unsatisfying outcome. Finally, discussion and evaluation of group key agreement protocols in cloud is given in a generalized way to provide a reference for further study.