Alaa Kadhim F.

Work place: Computer Sciences Department, University of technology/ Baghdad, Iraq

E-mail: dralaa_cs@yahoo.com

Website:

Research Interests: Computer systems and computational processes, Image Compression, Image Manipulation, Image Processing, Information Systems, Data Compression, Data Structures and Algorithms, Big data and learning analytics

Biography

Alaa K. Farhan received the B.S. in computer science from University of Technology and received the M.S. in computer science (data security) from University of Technology, in 2003 and 2005 respectively and received the PhD in computer science from University of Technology, in 2009. His research interest includes intelligent systems, privacy, Security, management of big data, and image processing applications.

Author Articles
Security Protocol of Keys Management System for Transmission Encrypted Data

By Rasha Subhi Ali Alaa Kadhim F.

DOI: https://doi.org/10.5815/ijcnis.2018.01.02, Pub. Date: 8 Jan. 2018

One of the essential obstacles for the deployment of multicast is the lack of protection. And in multicast security, key management for securing organization or group communication is an important area that desires to be addressed. This paper will give an overview of four key management methods and Kerberos protocol. Cryptographic methods are frequently used for secure Data transmission wireless networks. Most cryptographic approaches can be symmetric and asymmetric, depending on the manner of the utilized keys. There are many kinds of key management methods which have been suggested for secure data transmission. This research includes a study of different key management methods to find an efficient key management for Secure and Reliable data transmission in the network. The experimental results showed that the fourth method represents the optimal key management method because it was providing a more secure way for the transmitted data, and the total time for data retrieval was (314.065, 376.119, 590.348, and 474.881) for the four key management methods sequentially to retrieve 71923records. The first three key management methods depend on symmetric key cryptography and the fourth key management method is a hybrid method, it was dependent on symmetric and asymmetric key cryptography, symmetric in the case of using user shared key and asymmetric in case of using server private key and this was unknown for any one.

[...] Read more.
Other Articles