Articles | Open Access | https://doi.org/10.55640/

UNLOCKING EFFICIENCY: RESOURCE ACCESS OPTIMIZATION WITH THE KEY TREES COMBINING ALGORITHM FOR OVERLAPPING MEMBERS

Vaibhav Varadkar , Computer Engineering and Information Technology Department, College of Engineering, Pune Wellesley Rd, Shivajinagar, Pune, Maharashtra, India

Abstract

This paper introduces a novel approach to resource access optimization in collaborative environments with overlapping member access. The Key Trees Combining Algorithm (KTCA) is proposed to streamline access to shared resources by efficiently managing overlapping access permissions among members. KTCA leverages hierarchical structures to reduce redundancy and complexity in access control. Through experimental validation, this paper demonstrates the effectiveness of KTCA in improving resource access efficiency and reducing access conflicts, making it a valuable tool for collaborative platforms and shared resource management.

Keywords

Resource access optimization, Key Trees Combining Algorithm (KTCA), Collaborative environments

References

W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976.

X. Gu, Y. Zhao, and J. Yang, “Reducing rekeying time using an integrated group key agreement scheme,” Journal of Communications and Networks, vol. 14, no. 4, pp. 418–428, 2012.

H. R. Hassen, A. Bouabdallah, H. Bettahar, and Y. Challal, “Key management for content access control in a hierarchy,” Computer Networks, vol. 51, no. 11, pp. 3197–3219, 2007.

R. Ingle and G. Sivakumar, “Tunable group key agreement,” in 32nd IEEE Conference on Local Computer Networks (LCN’07), pp. 1017–1024, 2007.

S. Jarecki, J. Kim, and G. Tsudik, “Flexible robust group key agreement,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 879– 886, 2011.

D. H. Je, J. S. Lee, Y. Park, and S. W. Seo, “Computation-and-storage-efficient key tree management protocol for secure multicast communications,” Computer Communications, vol. 33, no. 2, pp. 136–148, 2010.

Y. Kim, A. Perrig, and G. Tsudik, “Tree-based group key agreement,” ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 60–96, 2004.

Lam, S. Szebeni, and L. Butty´an, “Invitationoriented tgdh: Key management for dynamic groups in an asynchronous communication model,” in 41st IEEE International Conference on Parallel Processing Workshops (ICPPW’12), pp. 269–276, 2012.

D. Li and S. Sampalli, “A hybrid group key management protocol for reliable and authenticated rekeying,” International Journal of Network Security, vol. 6, no. 3, pp. 270–281, 2008.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

UNLOCKING EFFICIENCY: RESOURCE ACCESS OPTIMIZATION WITH THE KEY TREES COMBINING ALGORITHM FOR OVERLAPPING MEMBERS. (2024). International Journal of Networks and Security, 4(01), 01-05. https://doi.org/10.55640/