Due to the penetration of various digital devices in our daily life, the data increases in an explosive way. It is highly agreed that the big data era is coming. Big data has a significant and promising future, and makes it a hot topic in the research community. Meanwhile, big data applications also raise consideration of security, privacy and trust on the networking layer. At present, the access control of cloud is vulnerable in existing schemes which may cause the loss and disclosure of the data easily. In this paper, we propose a secure key management scheme which may be deployed in big data networking to protect user’s data and privacy. In the proposed key management scheme, keys are divided into three layers. In the layered structure, upper keys encrypt lower keys to guarantee the security of keys. In the proposed scheme, big data networking, servers and others can know nothing of user’s key. Data owner can achieve ciphertext sharing to share their information to anyone they just went securely. Hierarchical key management is convenient, secure and efficient, and it can protect user’s private data in big data networking.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
Tax calculation will be finalised during checkout.
Xu L, Jiang C, Wang J et al (2014) Information security in big data: privacy and data mining. Access IEEE 2:1–28
Irshadhussain N, Choudhury B, Rakshit S (2014) A novel method for preserving privacy in big-data mining. Int J Comput Appl 103(16):21–25
Fire M, Kagan D, Elishar A, et al (2012) Social privacy protector - protecting Users' privacy in Social networks. International Conference on Social eco-informatics. 46-50
Arockiam L, Monikandan S (2014) Efficient cloud storage confidentiality to ensure data security. International Conference on Computer communication and informatics. 1-5
Monikandan S, Arockiam L (2015) Confidentiality technique to enhance security of data in public cloud storage using data obfuscation. Indian Journal of Science & Technology 8(24)
Ajtai M (2013) Public key cryptosystem and associated method utilizing a hard lattice with O(n log n) random bits for security: US, US 8462940 B2[P]
Lu K, Qian Y, Guizani M et al (2008) A framework for a distributed key management scheme in heterogeneous wireless sensor networks. IEEE Trans Wirel Commun 7(2):639–647
Eschenaer B L. and V.D. Gligor (2013) A key-management scheme for distributed sensor networks[C]// ACM Conference on Computer and Communications Security
Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329
Aggarwal A, Garg R, Mittal P A, et al (2006) Generation, distribution, storage, redemption, validation and clearing of electronic coupons: US, US7013286[P]
Li JH, Bhattacharjee B, Yu M et al (2008) A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Futur Gener Comput Syst 24(8):860–869
Dan B, Boyen X, Halevi S (2006) Chosen Ciphertext secure public key threshold encryption without random oracles. The Cryptographers' Track at the Rsa Conference on Topics in Cryptology Springer-Verlag, 226–243
Liu Z, Cao Z (2010) On efficiently transferring the linear secret-sharing scheme matrix in Ciphertext-policy attribute-based encryption. Iacr Cryptology Eprint Archive +, 2010
Ravilla D, Putta CSR (2015) Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs. International Conference on Electronic Design, Computer Networks & Automated Verification. IEEE, 154-159
Oliveira SRM, Zaïane OR (2004) Achieving Privacy Preservation when Sharing Data for Clustering. Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, PRO 67-82
Xue H (2012) A privacy protection model for transparent computing system. International Journal of Cloud Computing 1(4):367–384
Guo G, Zhou Y (2009) Block-based data consistency method for transparent computing. Journal of Tsinghua University 49(10):1721–1724
This work has been financially supported by the National Natural Science Foundation of China (No. 61303216, No. 61272457, No. U1401251, and No. 61373172), the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China (No. ICT170312), the National High Technology Research and Development Program of China (863 Program) (No. 2012AA013102), and National 111 Program of China B16037 and B08038.
This article is part of the Topical Collection: Special Issue on Big Data Networking
Guest Editors: Xiaofei Liao, Song Guo, Deze Zeng, and Kun Wang
About this article
Cite this article
Fan, K., Lou, S., Su, R. et al. Secure and private key management scheme in big data networking. Peer-to-Peer Netw. Appl. 11, 992–999 (2018). https://doi.org/10.1007/s12083-017-0579-z
- Big data networking
- Key management
- Ciphertext sharing
- Hierarchical structure