Rasha Subhi Ali

Work place: Computer Sciences Department, University of technology/ Baghdad, Iraq

E-mail: danafush@gmail.com


Research Interests: Computer systems and computational processes, Systems Architecture, Information Security, Information Systems, Data Mining, Database Management System, Data Compression, Data Structures and Algorithms


Rasha S. Ali received the B.S. in artificial intelligent in computer science from University of Technology and received the M.S. in computer science (data mining) from Baghdad University, in 2008 and 2013 respectively and received the PhD in computer science (secure retrieval from big encrypted data) from University of Technology, in 2017. His research interest includes intelligent systems, privacy, Security, management of big data, data mining and database applications.

Author Articles
Security Protocol of Keys Management System for Transmission Encrypted Data

By Rasha Subhi Ali Alaa Kadhim F.

DOI: https://doi.org/10.5815/ijcnis.2018.01.02, Pub. Date: 8 Jan. 2018

One of the essential obstacles for the deployment of multicast is the lack of protection. And in multicast security, key management for securing organization or group communication is an important area that desires to be addressed. This paper will give an overview of four key management methods and Kerberos protocol. Cryptographic methods are frequently used for secure Data transmission wireless networks. Most cryptographic approaches can be symmetric and asymmetric, depending on the manner of the utilized keys. There are many kinds of key management methods which have been suggested for secure data transmission. This research includes a study of different key management methods to find an efficient key management for Secure and Reliable data transmission in the network. The experimental results showed that the fourth method represents the optimal key management method because it was providing a more secure way for the transmitted data, and the total time for data retrieval was (314.065, 376.119, 590.348, and 474.881) for the four key management methods sequentially to retrieve 71923records. The first three key management methods depend on symmetric key cryptography and the fourth key management method is a hybrid method, it was dependent on symmetric and asymmetric key cryptography, symmetric in the case of using user shared key and asymmetric in case of using server private key and this was unknown for any one.

[...] Read more.
Other Articles