M. Li, Ruijie Zhang, Xiang Du, Min Zhou, Luqi Yan, Jiacheng Song
{"title":"云环境下组密钥协商协议综述","authors":"M. Li, Ruijie Zhang, Xiang Du, Min Zhou, Luqi Yan, Jiacheng Song","doi":"10.1109/IC3.2018.00-38","DOIUrl":null,"url":null,"abstract":"This survey is aimed at reviewing the group key agreement protocols in cloud environment. These protocols are given a classification, which are group key agreement protocol, triple-party protocol and double-party protocol, according to the number of users participating in the agreement. Then we give a summary of these proposed key agreement protocols based on the classification. After performing analysis on security and performance of these key agreement protocols respectively, a comment on each category is made and given in this paper. Based on which, it is unmistakably that Odelu et al.'s protocol in [47] shows the best performance both in security and efficiency, while Tseng et al.'s protocol in [45] reveals unsatisfying outcome. Finally, discussion and evaluation of group key agreement protocols in cloud is given in a generalized way to provide a reference for further study.","PeriodicalId":236366,"journal":{"name":"2018 1st International Cognitive Cities Conference (IC3)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Survey on Group Key Agreement Protocols in Cloud Environment\",\"authors\":\"M. Li, Ruijie Zhang, Xiang Du, Min Zhou, Luqi Yan, Jiacheng Song\",\"doi\":\"10.1109/IC3.2018.00-38\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This survey is aimed at reviewing the group key agreement protocols in cloud environment. These protocols are given a classification, which are group key agreement protocol, triple-party protocol and double-party protocol, according to the number of users participating in the agreement. Then we give a summary of these proposed key agreement protocols based on the classification. After performing analysis on security and performance of these key agreement protocols respectively, a comment on each category is made and given in this paper. Based on which, it is unmistakably that Odelu et al.'s protocol in [47] shows the best performance both in security and efficiency, while Tseng et al.'s protocol in [45] reveals unsatisfying outcome. Finally, discussion and evaluation of group key agreement protocols in cloud is given in a generalized way to provide a reference for further study.\",\"PeriodicalId\":236366,\"journal\":{\"name\":\"2018 1st International Cognitive Cities Conference (IC3)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 1st International Cognitive Cities Conference (IC3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3.2018.00-38\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 1st International Cognitive Cities Conference (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2018.00-38","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey on Group Key Agreement Protocols in Cloud Environment
This survey is aimed at reviewing the group key agreement protocols in cloud environment. These protocols are given a classification, which are group key agreement protocol, triple-party protocol and double-party protocol, according to the number of users participating in the agreement. Then we give a summary of these proposed key agreement protocols based on the classification. After performing analysis on security and performance of these key agreement protocols respectively, a comment on each category is made and given in this paper. Based on which, it is unmistakably that Odelu et al.'s protocol in [47] shows the best performance both in security and efficiency, while Tseng et al.'s protocol in [45] reveals unsatisfying outcome. Finally, discussion and evaluation of group key agreement protocols in cloud is given in a generalized way to provide a reference for further study.