Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2019, Cilt: 2 Sayı: 2, 4 - 7, 28.12.2019

Öz

Kaynakça

  • [1] Prathap M. Joe and Vasudevan V., "Analysis of the various key management algorithms and new proposal in secure multicast communications." arXiv preprint arXiv:0906.3956, 2009.
  • [2] Gu Q., Peng L., and Wang-Chien L., "KTR: An efficient key management scheme for secure data access control in wireless broadcast services." IEEE Transactions on Dependable and Secure Computing, 6(3), pp. 188-201, 2009.
  • [3] Song W., Zou H., Liu H., and Chen J., "A practical group key management algorithm for cloud data sharing with dynamic group." China Communications, 13(6), pp. 205-216, 2016.
  • [4] Alyani N., Seman K., Nawawi NM., and Sayuti MNSM., "The Improvement of Key Management Based On Logical Key Hierarchy by Implementing Diffie Hellman Algorithm." J. Emerging Trends in Computing and Information Sciences, 3(3), 2012.
  • [5] Sakamoto T., Tsuji T., and KajiY., "Group key rekeying using the LKH technique and the Huffman algorithm." Information Theory and Its Applications (ISITA), pp. 1-6, 2008.
  • [6] Liu H., Li J., Hao X., and Zou G., "A novel LKH key tree structure based on heuristic search algorithm." Communication Problem-Solving (ICCP), pp. 35-38, 2014.
  • [7] Sakamoto N., "An efficient structure for LKH key tree on secure multicast communications." In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1-7, 2014.
  • [8] Bodur H. and Kara R., "Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission." Computational Intelligence and Communication Networks (CICN), pp. 144-147, 2017.
  • [9] Wong CK., Gouda M., and Lam SS., "Secure group communications using key graphs." IEEE/ACM transactions on networking, 8(1), pp. 16-30, 1998.
  • [10] Sherman AT. and McGrew DA., "Key establishment in large dynamic groups using one-way function trees." IEEE transactions on Software Engineering, 29(5), pp. 444–458, 2003.
  • [11] Canetti R., Garay J., Itkis G., Micciancio D., Naor M., et al., "Multicast security: A taxonomy and some efficient constructions in INFOCOM’99." Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies Proceedings. IEEE, pp. 708-716, 1999.
  • [12] Kim Y., Perrig A., and Tsudik G., "Tree-based group key agreement." ACM Transactions on Information and System Security (TISSEC), 7(1), pp. 60–96, 2004.

Implementation Logical Key Hierarchy to a Nosql Database in Cloud Computing

Yıl 2019, Cilt: 2 Sayı: 2, 4 - 7, 28.12.2019

Öz

Cloud computing is a system that keeps the system, software or data contained in remote data centers and enables them to access at a desired time and on a desired device over the internet. With the rapid growth of the Internet, broadcast communication has become an issue to be implemented in many areas. In shortly, broadcast communication is the transmission of a message from broadcast center to all or some of the users which connected to it. Various schemes have been developed to allow a single sender to transmit a data to multiple users. The most common use among these schemes is Logical Key Hierarchy (LKH). In this study, two applications have been developed to explain how to integrate MAH structure into a Nosql database on cloud computing, one of which is broadcasting center and the other is user application.

Kaynakça

  • [1] Prathap M. Joe and Vasudevan V., "Analysis of the various key management algorithms and new proposal in secure multicast communications." arXiv preprint arXiv:0906.3956, 2009.
  • [2] Gu Q., Peng L., and Wang-Chien L., "KTR: An efficient key management scheme for secure data access control in wireless broadcast services." IEEE Transactions on Dependable and Secure Computing, 6(3), pp. 188-201, 2009.
  • [3] Song W., Zou H., Liu H., and Chen J., "A practical group key management algorithm for cloud data sharing with dynamic group." China Communications, 13(6), pp. 205-216, 2016.
  • [4] Alyani N., Seman K., Nawawi NM., and Sayuti MNSM., "The Improvement of Key Management Based On Logical Key Hierarchy by Implementing Diffie Hellman Algorithm." J. Emerging Trends in Computing and Information Sciences, 3(3), 2012.
  • [5] Sakamoto T., Tsuji T., and KajiY., "Group key rekeying using the LKH technique and the Huffman algorithm." Information Theory and Its Applications (ISITA), pp. 1-6, 2008.
  • [6] Liu H., Li J., Hao X., and Zou G., "A novel LKH key tree structure based on heuristic search algorithm." Communication Problem-Solving (ICCP), pp. 35-38, 2014.
  • [7] Sakamoto N., "An efficient structure for LKH key tree on secure multicast communications." In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1-7, 2014.
  • [8] Bodur H. and Kara R., "Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission." Computational Intelligence and Communication Networks (CICN), pp. 144-147, 2017.
  • [9] Wong CK., Gouda M., and Lam SS., "Secure group communications using key graphs." IEEE/ACM transactions on networking, 8(1), pp. 16-30, 1998.
  • [10] Sherman AT. and McGrew DA., "Key establishment in large dynamic groups using one-way function trees." IEEE transactions on Software Engineering, 29(5), pp. 444–458, 2003.
  • [11] Canetti R., Garay J., Itkis G., Micciancio D., Naor M., et al., "Multicast security: A taxonomy and some efficient constructions in INFOCOM’99." Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies Proceedings. IEEE, pp. 708-716, 1999.
  • [12] Kim Y., Perrig A., and Tsudik G., "Tree-based group key agreement." ACM Transactions on Information and System Security (TISSEC), 7(1), pp. 60–96, 2004.
Toplam 12 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Yapay Yaşam ve Karmaşık Uyarlanabilir Sistemler
Bölüm Research Article
Yazarlar

Hüseyin Bodur

Resul Kara

Yayımlanma Tarihi 28 Aralık 2019
Yayımlandığı Sayı Yıl 2019 Cilt: 2 Sayı: 2

Kaynak Göster

IEEE H. Bodur ve R. Kara, “Implementation Logical Key Hierarchy to a Nosql Database in Cloud Computing”, International Journal of Data Science and Applications, c. 2, sy. 2, ss. 4–7, 2019.

AI Research and Application Center, Sakarya University of Applied Sciences, Sakarya, Türkiye.