Efficient Parallel key management for Distributed Data Security in Content Delivery Networks

Authors(2) :-SK.Ahmad Shah, Dr. Penmesta V Krishna Raja

Technology and its significant has changed the way of the time being lead to next level of journey to make classical technology to the ultra modern technology. Time being is called as the data to be secured with the node based cloud cluster mechanism. In this paper, we have the glimpse of the technology and its Significance may be loop based hole to imagine world, but in the terms of Reality really itís a wonder, where we think ability the more and more to explore things may be technology to give a seam less service the mankind. If we consider the networking where we made this ethereal world to a global village making things better, but there is no end of better. If we consider the parallel distributed network, where these days we face the difficulty in transferring the data, in turn we callas load balancing along with some other factors may also come. Hence, in this paper we try to give the glimpse of the best mechanism which involves the load balancing in Content Delivery Networks in the discrete acknowledge based dynamic method. We have taken consideration of the access control based approach where data sharing would base on the group based specific and acknowledgment based approach to implement the best cryptographic approach. In order to secure the best of the privacy we have implemented the dynamic group based encryption and decryption mechanism to some authorized group based on the clustered node where attribute based acknowledgement in the private share delivery networks.

Authors and Affiliations

SK.Ahmad Shah
Assistant Professor, Department of IT, Aditya College of Engineering & Technology, Surampalem, Kakinada, East Godavari, Andhra Pradesh, India
Dr. Penmesta V Krishna Raja
Principal & Professor, Kakinada Institute of Engineering and Technology, Kakinada, East Godavari, Andhra Pradesh, India

Access control, attribute-based encryption ABE, disruption-tolerant network (DTN), multi-authority, secure data retrieval.

  1. A. Doria, M. Uden, and D. P. Pandey, Providing connectivity to the saaminomadic community, in Proceedings of the 2nd International Conference onOpen Collaborative Design for Sustainable Innovation (dyd 02), Bangalore, India, Dec 2002.
  2. A. Pentland, R. Fletcher, and A. A. Hasson, A road to universal broadband connectivity, in Proceedings of the 2nd International Conference on Open Collaborative Design for Sustainable Innovation (dyd 02), Bangalore, India, Dec 2002.
  3. G. E. Prescott, S. A. Smith, and K. Moe, Real-time information system technology challenges for NASAs earth science enterprise, in Proceedings of The 20th IEEE Real-Time Systems Symposium, Phoenix, Arizona, Dec 1999.
  4. P. Juang, H. Oki, Y. Wang, M. Martonosi, L. S. Peh, and D. Rubenstein, Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet, in Proceedings of ACM ASPLOS, 2002.
  5. Disruption tolerant networking, http://www.darpa.mil/ato/solicit/DTN/.
  6. J. Ott and D. Kutscher, A disconnection-tolerant transport for drive-thruinternet environments, in Proceedings of IEEE INFOCOM, 2005.
  7. G. W. Boehlert, D. P. Costa, D. E. Crocker, P. Green, T. OBrien, S. Levitus, and B. J. Le Boeuf, Autonomous pinniped environmental samplers; using instrumented animals as oceanographic data collectors, Journal of Atmospheric and Oceanic Technology, vol. 18, no. 11, pp. 18821893, 2001, 18 (11).
  8. T. Small and Z. Haas, The shared wireless infostation model - a new ad hoc networking paradigm (or where there is a whale, there is a way), in Proceedings of The Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2003), June 2003, pp. 233244.
  9. K. Fall, A Delay-Tolerant Network Architecture for Challenged Internets, SIGCOMM, August 2003.
  10. A. Beaufour, M. Leopold, and P. Bonnet, Smart-tag based data dissemination, in First ACM International Workshop on Wireless Sensor Networks and Applications (WSNA02), June 2002.
  11. A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, and D. Terry, Epidemic algorithms for replicated database† maintenance, in Proceedings of the ACM Symposium on Principles of Distributed Computing, 1987, pp. 112.
  12. W. Vogels, R. V. Renesse, and K. Birman, The power of epidemics: Robust communication for large-scale distributed systems, In Proceedings of HotNets-I’02: First Workshop on Hot Topics in Networks, special issue of the ACMSIGCOMM Computer Communication Review, Princeton, NJ. October 2002.
  13. Delay tolerant networking research group, http://www.dtnrg.org.
  14. P. Zhang, C. M. Sadler, S. A. Lyon, and M. Martonosi, Hardware design experiences in zebranet, In Proc. ACM SenSys, pages 227238, 2004.
  15. M. Motani, V. Srinivasan, and P. Nuggehalli, PeopleNet: Engineering a† Wireless Virtual Social Network, In Proc. ACM Mobicom, pages 243257, Aug. 2005.
  16. J. Partan, J. Kurose, and B. N. Levine, A Survey of Practical Issues in Underwater Networks, In Proc. ACM WUWNet, pages 1724, Sept. 2006.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 900-904
Manuscript Number : CSEIT1726260
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

SK.Ahmad Shah, Dr. Penmesta V Krishna Raja, "Efficient Parallel key management for Distributed Data Security in Content Delivery Networks", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.900-904, November-December-2017.
Journal URL : http://ijsrcseit.com/CSEIT1726260

Article Preview