Journal Title : International Journal of Modern Trends in Engineering and Science


Author’s Name : A Jayasmruthi | P Parthasarathi  unnamed

Volume 03 Issue 12 2016

ISSN no:  2348-3121

Page no: 25-28

Abstract – Cloud computing is a technology where user can outsource their data over Internet. Cloud computing has developed entire new domain of determinable, legitimate and resourceful data for organizations in term of   private cloud computing. The main issue of cloud computing is security. The data stored at data centers needs to be retrieved without any data loss and attack.  Key Management is a critical security service for communicating in group communication.  The key management system should be secure, robust and efficient for a secure communication protocol.  This survey paper is about various algorithms and proposes a secure and dynamic key distribution scheme. This key distribution technique governs both forward and backward secrecy. This paper proposes the secure mechanism of generating key, sharing a key and validating use of the key among the group communication.  

Keywords— Cloud Security, Key Management, Rekeying, Cloud Computing


  1. Rajdeep Bhanot ,Rahul Hans A Review and comparative analysis of various encryption algorithm International Journal of Security and Its Applications Vol. 9, No. 4 (2015).
  2. G. Muthukumar, Dr. E. George Dharma Prakash Raj A Comparative analysis on Symmetric key Encryption Algorithms International Journal of Advanced Research in Computer Engineering &Technology(IJARCET)Volume 3, Issue 2, February (2014)
  3. Ayushi A Symmetric key Cryptographic algorithm International Journal of Computer Applications (0975 – 8887) Volume 1 – No. 15 (2010)
  4. Apoorva, Yogesh Kumar Comparative Study of Different Symmetric Key Cryptography Algorithms International Journal of Application or Innovation in Engineering & Management Volume 2, Issue 7July (2013)
  5. Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona Analysis and comparison of symmetric key cryptographic algorithm based on various file feature International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July( 2014 )
  6. Anjula Gupta, Navpreet Kaur Walia Cryptography Algorithms: A Review International Journal of Engineering Development and Research Volume 2, Issue 2 ( 2014)
  7. Mohit Marwaha, Rajeev Bedi, Amritpal Singh, Tejinder Singh Comparative Analysis Of Cryptographic International Journal of Advanced Engineering Technology E-ISSN 0976-3945 (2011)
  8. NehaGarg, PartibhaYadav Comparison of Asymmetric Algorithms in Cryptography IJCSMC, Vol. 3, Issue. 4, April (2014)
  9. Md. Alam Hossain, Md. Biddut Hossain, Md. Shafin Uddin, Shariar Md. Imtiaz Performance Analysis of Different Cryptography Algorithms International Journal of Advanced Research in Computer science and engineering Volume 6, Issue 3, March (2016)
  10. Ms. Pallavi H.Dixit, Dr.Uttam L. Bombale , Mr. Vinayak B. Patil Comparative Implementation of Cryptographic Algorithms on ARM Platform International Journal of Innovative Research in Science Vol. 2, Issue 10, October (2013)
  11. Gurpreet Singh , Supriya A Study of Encryption Algorithms International Journal of Computer Applications Volume 67– No.19, April (2013)
  12. Ashraf Odeh1 , Shadi R.Masadeh2 , Ahmad Azzazi A Performance evaluation of common encryption techniques with secure watermark system (SWS)International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May( 2015)
  13. R.Seetha R.Saravanan A survey on group key management schemes Cybernetics and information technologies Volume 15, No 3 (2015)
  14. J.V Shanta Evaluating the performance of Symmetric key Algorithms AES and DES in IJCEM International Journal of Computational Engineering &Management vol.15,no.4,(2012)
  15. B.V Baiju Secret Key Sharing Scheme Based On Key Generation Centre For Authenticated Exchange Of Messages International Journal of Engineering Science Invention Volume 2 Issue 11 November (2013)
  16. Mr. Sunny Bhadlawala Miss. Kajal Chachapara Proposed two layer cryptography key generation for off-premise cloud computing Nirma university International Conference on Engineering (2015)
  17. Sunghyuck Hong Secure and Efficient Key Generation protocol M.S.R Journal Of Research and Technology Volume 2 Issue 2 (2014)
Scroll Up