Analysis of key management protocols for social networks

被引:6
|
作者
Venkatesan, S. [1 ]
Oleshchuk, Vladimir A. [2 ]
Chellappan, C. [3 ]
Prakash, Sourabh [1 ]
机构
[1] Indian Inst Informat Technol, Network Secur & Cryptog Lab, Dept Informat Technol, Allahabad, Uttar Pradesh, India
[2] Univ Agder, Dept Informat & Commun Technol, Fac Sci & Engn, Kristiansand, Norway
[3] Anna Univ, GKM Coll Engn & Technol, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
关键词
Social networking services; Data security; Privacy; Key management;
D O I
10.1007/s13278-015-0310-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key management protocols play a major role in achieving data privacy in social networks because of the frequent addition and removal of users. Considering this, a remote storage service-key management protocol (RSS-KMP) is proposed in this paper and analysed the performance with respect to client addition and removal. RSS-KMP uses two keys, group key and content encryption/decryption key. Content decryption key will be encrypted using the group key and kept in social network service provider's storage. Group key will be distributed to the clients or stored in the social network service provider storage securely. Each client gets or receives the group key to get the data decryption key further to decrypt data. To achieve re-key distribution efficiency, clients are grouped according to their nature of relationship and relationship trust levels. This paper also categorizes the social network items into sensitive and non-sensitive to give an idea to clients about items privacy requirement. Finally, paper analysed existing key management protocols and the proposed RSS-KMP with respect to storage, message and encryption to show the proposed protocol efficiency.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [41] A review of data management and protocols for vehicular networks
    Cui, Baojiang
    Yan, Xiaodan
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2017, 13 (02) : 186 - 206
  • [42] Mobility Protocols for handoff management in heterogeneous networks
    Siddiqui, F.
    Zeadally, S.
    PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2006, 4217 : 1 - 12
  • [43] Efficient key distribution protocols for large-scale networks
    Ku, WC
    Wang, SD
    INFORMATION NETWORKING IN ASIA, 2001, 3 : 261 - 270
  • [44] Key establishment protocols for secure communication in clustered sensor networks
    Poornima, A. S.
    Amberker, B. B.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2013, 11 (02) : 120 - 138
  • [45] Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks
    Gu, Wenjun
    Chellappan, Sriram
    Bai, Xiaole
    Wang, Honggang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (04) : 1370 - 1381
  • [46] Mobility Management Protocols for Wireless Mesh Networks
    Zhang, Zhenxia
    Pazzi, Richard W.
    Boukerche, Azzedine
    PM2HW2N09: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON PERFORMANCE MONITORING, MEASUREMENT, AND EVALUATION OF HETEROGENEOUS WIRELESS AND WIRED NETWORKS, 2009, : 107 - 110
  • [47] Protocols for supporting a public key infrastructure in ad hoc networks
    Burmester, M
    Yasinsac, A
    SECURITY PROTOCOLS, 2005, 3364 : 274 - 287
  • [48] Comparative Analysis of Internet Key Exchange Protocols
    Shaheen, Safdar Hussain
    Yousaf, Muhammad
    Majeed, Muhammad Younas
    2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2015,
  • [49] Key substitution in the symbolic analysis of cryptographic protocols
    Chevalier, Yannick
    Kourjieh, Mounira
    FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 121 - 132