Secure and private key management scheme in big data networking


Due to the penetration of various digital devices in our daily life, the data increases in an explosive way. It is highly agreed that the big data era is coming. Big data has a significant and promising future, and makes it a hot topic in the research community. Meanwhile, big data applications also raise consideration of security, privacy and trust on the networking layer. At present, the access control of cloud is vulnerable in existing schemes which may cause the loss and disclosure of the data easily. In this paper, we propose a secure key management scheme which may be deployed in big data networking to protect user’s data and privacy. In the proposed key management scheme, keys are divided into three layers. In the layered structure, upper keys encrypt lower keys to guarantee the security of keys. In the proposed scheme, big data networking, servers and others can know nothing of user’s key. Data owner can achieve ciphertext sharing to share their information to anyone they just went securely. Hierarchical key management is convenient, secure and efficient, and it can protect user’s private data in big data networking.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7


  1. 1.

    Xu L, Jiang C, Wang J et al (2014) Information security in big data: privacy and data mining. Access IEEE 2:1–28

    Article  Google Scholar 

  2. 2.

    Irshadhussain N, Choudhury B, Rakshit S (2014) A novel method for preserving privacy in big-data mining. Int J Comput Appl 103(16):21–25

    Google Scholar 

  3. 3.

    Fire M, Kagan D, Elishar A, et al (2012) Social privacy protector - protecting Users' privacy in Social networks. International Conference on Social eco-informatics. 46-50

  4. 4.

    Arockiam L, Monikandan S (2014) Efficient cloud storage confidentiality to ensure data security. International Conference on Computer communication and informatics. 1-5

  5. 5.

    Monikandan S, Arockiam L (2015) Confidentiality technique to enhance security of data in public cloud storage using data obfuscation. Indian Journal of Science & Technology 8(24)

  6. 6.

    Ajtai M (2013) Public key cryptosystem and associated method utilizing a hard lattice with O(n log n) random bits for security: US, US 8462940 B2[P]

  7. 7.

    Lu K, Qian Y, Guizani M et al (2008) A framework for a distributed key management scheme in heterogeneous wireless sensor networks. IEEE Trans Wirel Commun 7(2):639–647

    Article  Google Scholar 

  8. 8.

    Eschenaer B L. and V.D. Gligor (2013) A key-management scheme for distributed sensor networks[C]// ACM Conference on Computer and Communications Security

  9. 9.

    Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329

    Article  Google Scholar 

  10. 10.

    Aggarwal A, Garg R, Mittal P A, et al (2006) Generation, distribution, storage, redemption, validation and clearing of electronic coupons: US, US7013286[P]

  11. 11.

    Li JH, Bhattacharjee B, Yu M et al (2008) A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Futur Gener Comput Syst 24(8):860–869

    Article  Google Scholar 

  12. 12.

    Dan B, Boyen X, Halevi S (2006) Chosen Ciphertext secure public key threshold encryption without random oracles. The Cryptographers' Track at the Rsa Conference on Topics in Cryptology Springer-Verlag, 226–243

  13. 13.

    Liu Z, Cao Z (2010) On efficiently transferring the linear secret-sharing scheme matrix in Ciphertext-policy attribute-based encryption. Iacr Cryptology Eprint Archive +, 2010

  14. 14.

    Ravilla D, Putta CSR (2015) Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs. International Conference on Electronic Design, Computer Networks & Automated Verification. IEEE, 154-159

  15. 15.

    Oliveira SRM, Zaïane OR (2004) Achieving Privacy Preservation when Sharing Data for Clustering. Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, PRO 67-82

  16. 16.

    Xue H (2012) A privacy protection model for transparent computing system. International Journal of Cloud Computing 1(4):367–384

    Article  Google Scholar 

  17. 17.

    Guo G, Zhou Y (2009) Block-based data consistency method for transparent computing. Journal of Tsinghua University 49(10):1721–1724

    Google Scholar 

Download references


This work has been financially supported by the National Natural Science Foundation of China (No. 61303216, No. 61272457, No. U1401251, and No. 61373172), the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China (No. ICT170312), the National High Technology Research and Development Program of China (863 Program) (No. 2012AA013102), and National 111 Program of China B16037 and B08038.

Author information



Corresponding author

Correspondence to Kai Fan.

Additional information

This article is part of the Topical Collection: Special Issue on Big Data Networking

Guest Editors: Xiaofei Liao, Song Guo, Deze Zeng, and Kun Wang

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Fan, K., Lou, S., Su, R. et al. Secure and private key management scheme in big data networking. Peer-to-Peer Netw. Appl. 11, 992–999 (2018).

Download citation


  • Big data networking
  • Key management
  • Ciphertext sharing
  • Hierarchical structure
  • Security