Research Article
BibTex RIS Cite
Year 2019, Volume: 2 Issue: 2, 4 - 7, 28.12.2019

Abstract

References

  • [1] Prathap M. Joe and Vasudevan V., "Analysis of the various key management algorithms and new proposal in secure multicast communications." arXiv preprint arXiv:0906.3956, 2009.
  • [2] Gu Q., Peng L., and Wang-Chien L., "KTR: An efficient key management scheme for secure data access control in wireless broadcast services." IEEE Transactions on Dependable and Secure Computing, 6(3), pp. 188-201, 2009.
  • [3] Song W., Zou H., Liu H., and Chen J., "A practical group key management algorithm for cloud data sharing with dynamic group." China Communications, 13(6), pp. 205-216, 2016.
  • [4] Alyani N., Seman K., Nawawi NM., and Sayuti MNSM., "The Improvement of Key Management Based On Logical Key Hierarchy by Implementing Diffie Hellman Algorithm." J. Emerging Trends in Computing and Information Sciences, 3(3), 2012.
  • [5] Sakamoto T., Tsuji T., and KajiY., "Group key rekeying using the LKH technique and the Huffman algorithm." Information Theory and Its Applications (ISITA), pp. 1-6, 2008.
  • [6] Liu H., Li J., Hao X., and Zou G., "A novel LKH key tree structure based on heuristic search algorithm." Communication Problem-Solving (ICCP), pp. 35-38, 2014.
  • [7] Sakamoto N., "An efficient structure for LKH key tree on secure multicast communications." In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1-7, 2014.
  • [8] Bodur H. and Kara R., "Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission." Computational Intelligence and Communication Networks (CICN), pp. 144-147, 2017.
  • [9] Wong CK., Gouda M., and Lam SS., "Secure group communications using key graphs." IEEE/ACM transactions on networking, 8(1), pp. 16-30, 1998.
  • [10] Sherman AT. and McGrew DA., "Key establishment in large dynamic groups using one-way function trees." IEEE transactions on Software Engineering, 29(5), pp. 444–458, 2003.
  • [11] Canetti R., Garay J., Itkis G., Micciancio D., Naor M., et al., "Multicast security: A taxonomy and some efficient constructions in INFOCOM’99." Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies Proceedings. IEEE, pp. 708-716, 1999.
  • [12] Kim Y., Perrig A., and Tsudik G., "Tree-based group key agreement." ACM Transactions on Information and System Security (TISSEC), 7(1), pp. 60–96, 2004.

Implementation Logical Key Hierarchy to a Nosql Database in Cloud Computing

Year 2019, Volume: 2 Issue: 2, 4 - 7, 28.12.2019

Abstract

Cloud computing is a system that keeps the system, software or data contained in remote data centers and enables them to access at a desired time and on a desired device over the internet. With the rapid growth of the Internet, broadcast communication has become an issue to be implemented in many areas. In shortly, broadcast communication is the transmission of a message from broadcast center to all or some of the users which connected to it. Various schemes have been developed to allow a single sender to transmit a data to multiple users. The most common use among these schemes is Logical Key Hierarchy (LKH). In this study, two applications have been developed to explain how to integrate MAH structure into a Nosql database on cloud computing, one of which is broadcasting center and the other is user application.

References

  • [1] Prathap M. Joe and Vasudevan V., "Analysis of the various key management algorithms and new proposal in secure multicast communications." arXiv preprint arXiv:0906.3956, 2009.
  • [2] Gu Q., Peng L., and Wang-Chien L., "KTR: An efficient key management scheme for secure data access control in wireless broadcast services." IEEE Transactions on Dependable and Secure Computing, 6(3), pp. 188-201, 2009.
  • [3] Song W., Zou H., Liu H., and Chen J., "A practical group key management algorithm for cloud data sharing with dynamic group." China Communications, 13(6), pp. 205-216, 2016.
  • [4] Alyani N., Seman K., Nawawi NM., and Sayuti MNSM., "The Improvement of Key Management Based On Logical Key Hierarchy by Implementing Diffie Hellman Algorithm." J. Emerging Trends in Computing and Information Sciences, 3(3), 2012.
  • [5] Sakamoto T., Tsuji T., and KajiY., "Group key rekeying using the LKH technique and the Huffman algorithm." Information Theory and Its Applications (ISITA), pp. 1-6, 2008.
  • [6] Liu H., Li J., Hao X., and Zou G., "A novel LKH key tree structure based on heuristic search algorithm." Communication Problem-Solving (ICCP), pp. 35-38, 2014.
  • [7] Sakamoto N., "An efficient structure for LKH key tree on secure multicast communications." In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1-7, 2014.
  • [8] Bodur H. and Kara R., "Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission." Computational Intelligence and Communication Networks (CICN), pp. 144-147, 2017.
  • [9] Wong CK., Gouda M., and Lam SS., "Secure group communications using key graphs." IEEE/ACM transactions on networking, 8(1), pp. 16-30, 1998.
  • [10] Sherman AT. and McGrew DA., "Key establishment in large dynamic groups using one-way function trees." IEEE transactions on Software Engineering, 29(5), pp. 444–458, 2003.
  • [11] Canetti R., Garay J., Itkis G., Micciancio D., Naor M., et al., "Multicast security: A taxonomy and some efficient constructions in INFOCOM’99." Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies Proceedings. IEEE, pp. 708-716, 1999.
  • [12] Kim Y., Perrig A., and Tsudik G., "Tree-based group key agreement." ACM Transactions on Information and System Security (TISSEC), 7(1), pp. 60–96, 2004.
There are 12 citations in total.

Details

Primary Language English
Subjects Artificial Life and Complex Adaptive Systems
Journal Section Research Article
Authors

Hüseyin Bodur

Resul Kara

Publication Date December 28, 2019
Published in Issue Year 2019 Volume: 2 Issue: 2

Cite

IEEE H. Bodur and R. Kara, “Implementation Logical Key Hierarchy to a Nosql Database in Cloud Computing”, International Journal of Data Science and Applications, vol. 2, no. 2, pp. 4–7, 2019.

AI Research and Application Center, Sakarya University of Applied Sciences, Sakarya, Türkiye.