Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

N-ary tree based key distribution in a network as a service provisioning model

: Kannan, A.; Maguire, G.Q.; Sharma, A.; Fusenig, V.; Schoo, P.

Preprint urn:nbn:de:0011-n-2414724 (1.2 MByte PDF)
MD5 Fingerprint: 4d0176720155fa06964d6752a8afaf86
© ACM 2012 This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution.
Erstellt am: 18.5.2013

Gopalan, K.:
ICACCI '12, Proceedings of the 1st International Conference on Advances in Computing, Communications and Informatics : 3 - 5 August 2012, Chennai, India
New York: ACM, 2012
ISBN: 978-1-4503-1196-0
International Conference on Advances in Computing, Communications and Informatics (ICACCI) <1, 2012, Chennai>
European Commission EC
FP7-ICT; 257448; SAIL
Konferenzbeitrag, Elektronische Publikation
Fraunhofer AISEC ()
cloud networking; security architecture; authentication; identity management; trust management; privacy

Cloud networking is a new technology which integrates network provisioning with the existing cloud service provisioning models. This integration allows service providers to provision network resources together with network performance guarantees as a part of their service offering. However, the introduction of multiple providers and service levels introduces many security challenges. One such challenge is identity management, especially authentication of different entities. This paper presents an analysis of a management scheme deployed in a simulated cloud network test bed. Our results show that this scheme is faster than binary and erasure encoding schemes. The scheme uses an N-ary approach and thus allows the placement of n entities at each level, unlike the binary scheme which is restricted to two entities.