2017
DOI: 10.1007/s12083-017-0579-z
|View full text |Cite
|
Sign up to set email alerts
|

Secure and private key management scheme in big data networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…As well, it careful not to send any values that might be a reason to reach the main keys, so all the sent values that the attacker may obtain have no meaning or benefit. As observed on the registration and login phases, AKMS provides zero-knowledge security by using the unify key K = H(S), which is the hash result calculated in both sides based on some other mathematical formulae as (7), (8):…”
Section: Ciphertext Sharingmentioning
confidence: 99%
See 2 more Smart Citations
“…As well, it careful not to send any values that might be a reason to reach the main keys, so all the sent values that the attacker may obtain have no meaning or benefit. As observed on the registration and login phases, AKMS provides zero-knowledge security by using the unify key K = H(S), which is the hash result calculated in both sides based on some other mathematical formulae as (7), (8):…”
Section: Ciphertext Sharingmentioning
confidence: 99%
“…Where it became an important and modern topic racing towards researchers as a rich field of research areas and come out with the most prominent researches and thoughts and innovative ways to deal with the problem and cover its gaps [4]. Big data networks today occupy great importance through the offer of usefulness that can be seized by the user in a big data environment [5], [6] where the user can store his data in the cloud service and share it with others [7]. Also, companies and employees can get great convenience by using cloud computing as modern and exclusive technology that is considered as a big data environment.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Kai Fan et al [29] also proposed a solution for Big Data security based on key hierarchical management. For this scheme, there are three levels of keys: lower, middle, and upper keys.…”
Section: Data Privacymentioning
confidence: 99%
“…Unlike previous studies [15,[25][26][27][28][29][30][31][32][33][34], this study focuses on not only access control and data storage but also develops an effective data management strategy and comprehensive solution for data security and privacy in a Big Data environment with a smart contract and Blockchain. It is worth noting that the use of a Blockchain to solve security and privacy problems in a Big Data environment has previously been demonstrated in various practical scenarios, such as [30][31][32][33][34].…”
Section: Data Privacymentioning
confidence: 99%