Key Trees Combining Algorithm for Overlapping Resource Access Members

In cloud computing environment, resources are accessed by multiple members. Resources may be considered as VM, CPU and Storage etc. In existing group key management, separate key trees are formed even if members are common in another group to access the resources. The solution to this is to form the combined key trees for resources which containing overlapping members. Through the analysis it is observed that computational overhead is decreased by 22% if they combine the key trees than separate key trees for each resource.

Spotlight

SECMYIT Infosec Solutions Pvt Ltd

SecMyIT is a team of passionate Consultants and Auditors. We came together for a cause, a noble cause...to Secure your IT. Who We Are. We are an Information Security Consulting and Training Services firm, providing specialized security services for Security Consultation, Audit, Documentation, Security Awareness, Infrastructure, Network and Applications. We are motivated to provide our customers with specially customized services like providing protection against external as well as internal threats and reduce business risk to improve security posture, achieve regulatory compliance and increase efficiency.

OTHER WHITEPAPERS
news image

Citrix Cloud Services Data Protection Overview

whitePaper | September 29, 2022

Citrix understands that data protection is one of the top priorities for our customers when selecting a cloud service. Data protection is also a rapidly-evolving domain and requires enterprises to assess more information over time about the data handling practices of their vendors.

Read More
news image

Acronis Cyber Protection Operation Centers Report: Ransomware dominates threat landscape

whitePaper | November 24, 2022

Acronis was the first company to implement complete integrated cyber protection to protect all data, applications and systems. Cyber protection requires the researching and monitoring of threats, as well as abiding by the five vectors of safety, accessibility, privacy, authenticity and security, or SAPAS. As part of the strategy, we’ve established four Cyber Protection Operation Centers (CPOCs) around the world to monitor and research cyberthreats 24/7.

Read More
news image

The State of Mobile App Security 2022

whitePaper | July 28, 2022

Mobile apps have become key tools for businesses to serve customers, earn revenue, and enable remote work by employees. Over the last two years, mobile apps have become critical to success for the majority of businesses.

Read More
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

A Lifeline: Patient Safety and Cybersecurity

whitePaper | December 3, 2019

Healthcare information is unique and personal to us all.Indeed,the patient is at the center of healthcare, as it would not exist if the patient did not exist. Bits and bytes in today’s digital world have real significance when it come to patient care lives are on the line.

Read More
news image

Best Practices for Common Cybersecurity Threats

whitePaper | November 28, 2022

The threat of Criminal cyber activity continues to grow for organizations around the world, targeting everyone from select individuals to leading corporations and federal governments.

Read More

Spotlight

SECMYIT Infosec Solutions Pvt Ltd

SecMyIT is a team of passionate Consultants and Auditors. We came together for a cause, a noble cause...to Secure your IT. Who We Are. We are an Information Security Consulting and Training Services firm, providing specialized security services for Security Consultation, Audit, Documentation, Security Awareness, Infrastructure, Network and Applications. We are motivated to provide our customers with specially customized services like providing protection against external as well as internal threats and reduce business risk to improve security posture, achieve regulatory compliance and increase efficiency.

Events