Analysis of key management protocols for social networks

被引:6
|
作者
Venkatesan, S. [1 ]
Oleshchuk, Vladimir A. [2 ]
Chellappan, C. [3 ]
Prakash, Sourabh [1 ]
机构
[1] Indian Inst Informat Technol, Network Secur & Cryptog Lab, Dept Informat Technol, Allahabad, Uttar Pradesh, India
[2] Univ Agder, Dept Informat & Commun Technol, Fac Sci & Engn, Kristiansand, Norway
[3] Anna Univ, GKM Coll Engn & Technol, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
关键词
Social networking services; Data security; Privacy; Key management;
D O I
10.1007/s13278-015-0310-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key management protocols play a major role in achieving data privacy in social networks because of the frequent addition and removal of users. Considering this, a remote storage service-key management protocol (RSS-KMP) is proposed in this paper and analysed the performance with respect to client addition and removal. RSS-KMP uses two keys, group key and content encryption/decryption key. Content decryption key will be encrypted using the group key and kept in social network service provider's storage. Group key will be distributed to the clients or stored in the social network service provider storage securely. Each client gets or receives the group key to get the data decryption key further to decrypt data. To achieve re-key distribution efficiency, clients are grouped according to their nature of relationship and relationship trust levels. This paper also categorizes the social network items into sensitive and non-sensitive to give an idea to clients about items privacy requirement. Finally, paper analysed existing key management protocols and the proposed RSS-KMP with respect to storage, message and encryption to show the proposed protocol efficiency.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [1] ANALYSIS OF KEY MANAGEMENT PROTOCOLS IN COMPUTER-NETWORKS
    UKHLINOV, LM
    AVTOMATIKA I VYCHISLITELNAYA TEKHNIKA, 1990, (01): : 11 - 16
  • [2] A semantic analysis of key management protocols for wireless sensor networks
    Macedonio, Damiano
    Merro, Massimo
    SCIENCE OF COMPUTER PROGRAMMING, 2014, 81 : 53 - 78
  • [3] Analysis model of key management protocols and performance evaluation for heterogeneous sensor networks
    Ma, Chun-Guang
    Zhong, Xiao-Rui
    Wang, Jiu-Ru
    Zhong, X.-R. (zhongxiaorui@hrbeu.edu.cn), 1600, Chinese Academy of Sciences (23): : 2817 - 2832
  • [4] Key management schemes and protocols for wireless sensor networks
    Su, Zhong
    Lin, Chuang
    Feng, Fu-Jun
    Ren, Feng-Yuan
    Ruan Jian Xue Bao/Journal of Software, 2007, 18 (05): : 1218 - 1231
  • [5] Enhanced Key Management Protocols for Wireless Sensor Networks
    Cui, Baojiang
    Wang, Ziyue
    Zhao, Bing
    Liang, Xiaobing
    Ding, Yuemin
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [6] Security Analysis of Existing IoT Key Management Protocols
    Naoui, Sarra
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [7] Simulation of Distributed Key Management Protocols in Clustered Wireless Sensor Networks
    Abraham, Jibi
    Ramanatha, K. S.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (02): : 21 - 32
  • [8] Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks
    Khan, Adnan Shahid
    Lenando, Halikul
    Abdullah, Johari
    Fisal, Norsheila
    JURNAL TEKNOLOGI, 2015, 73 (01): : 75 - 81
  • [9] Analysis and enhancement of two key agreement protocols for wireless networks
    Singhal, Anshul
    Garg, Vaibhav
    Mathuria, Anish
    2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 275 - +
  • [10] Security Analysis of Multicast/Unicast Router Key Management Protocols
    Huang, Yiqi
    Atwood, J. William
    2018 IEEE CANADIAN CONFERENCE ON ELECTRICAL & COMPUTER ENGINEERING (CCECE), 2018,