Analysis of key management protocols for social networks

被引:6
|
作者
Venkatesan, S. [1 ]
Oleshchuk, Vladimir A. [2 ]
Chellappan, C. [3 ]
Prakash, Sourabh [1 ]
机构
[1] Indian Inst Informat Technol, Network Secur & Cryptog Lab, Dept Informat Technol, Allahabad, Uttar Pradesh, India
[2] Univ Agder, Dept Informat & Commun Technol, Fac Sci & Engn, Kristiansand, Norway
[3] Anna Univ, GKM Coll Engn & Technol, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
关键词
Social networking services; Data security; Privacy; Key management;
D O I
10.1007/s13278-015-0310-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key management protocols play a major role in achieving data privacy in social networks because of the frequent addition and removal of users. Considering this, a remote storage service-key management protocol (RSS-KMP) is proposed in this paper and analysed the performance with respect to client addition and removal. RSS-KMP uses two keys, group key and content encryption/decryption key. Content decryption key will be encrypted using the group key and kept in social network service provider's storage. Group key will be distributed to the clients or stored in the social network service provider storage securely. Each client gets or receives the group key to get the data decryption key further to decrypt data. To achieve re-key distribution efficiency, clients are grouped according to their nature of relationship and relationship trust levels. This paper also categorizes the social network items into sensitive and non-sensitive to give an idea to clients about items privacy requirement. Finally, paper analysed existing key management protocols and the proposed RSS-KMP with respect to storage, message and encryption to show the proposed protocol efficiency.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [21] Lightweight Key Management Protocols for Smart Grids
    Suhendra, Vivy
    Wu, Yongdong
    Saputra, Hendra
    Zhao, Zhigang
    Bao, Feng
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 345 - 348
  • [22] Authenticated Key Management Protocols for Internet of Things
    Li, Celia
    Yang, Cungang
    2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 126 - 129
  • [23] Network Simulation of Group Key Management Protocols
    Manz, David
    Alves-Foss, Jim
    Zheng, Shanyu
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (01): : 67 - 79
  • [24] A class of flexible and efficient key management protocols
    Boyd, C
    9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 2 - 8
  • [25] On-demand key management based on social attribute for opportunistic networks
    Chen, Xi
    Li, Guang-Song
    Tian, You-Liang
    Ma, Jian-Feng
    Tongxin Xuebao/Journal on Communications, 2012, 33 (12): : 93 - 99
  • [26] Scalability analysis of location management protocols for mobile ad hoc networks
    Philip, SJ
    Ghosh, J
    Khedekar, S
    Qiao, CM
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 183 - 188
  • [27] Social Capital of Students in the Light of Social Networks: Structure and Key Actors Analysis
    Krekhovets, E.
    Poldin, O.
    VOPROSY OBRAZOVANIYA-EDUCATIONAL STUDIES MOSCOW, 2016, (03): : 59 - 79
  • [28] VSAT NETWORKS - ARCHITECTURES, PROTOCOLS, AND MANAGEMENT
    CHITRE, DM
    MCCOSKEY, JS
    IEEE COMMUNICATIONS MAGAZINE, 1988, 26 (07) : 28 - 38
  • [29] Management and routing Protocols for military networks
    Gibson, Timothy
    DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2008, 2008, 6981
  • [30] Key leaders in social networks
    Zhou, Junjie
    Chen, Ying-Ju
    JOURNAL OF ECONOMIC THEORY, 2015, 157 : 212 - 235