Browse > Article
http://dx.doi.org/10.14400/JDC.2014.12.3.237

Group key management protocol adopt to cloud computing environment  

Kim, Yong-Tae (Department of Multimedia Engineering, Hannam University)
Park, Gil-Cheol (Department of Multimedia Engineering, Hannam University)
Publication Information
Journal of Digital Convergence / v.12, no.3, 2014 , pp. 237-242 More about this Journal
Abstract
Recently, wind energy is expanding to combination of computing to forecast of wind power generation as well as intelligent of wind powerturbine. Wind power is rise and fall depending on weather conditions and difficult to predict the output for efficient power production. Wind power is need to reliably linked technology in order to efficient power generation. In this paper, distributed power generation forecasts to enhance the predicted and actual power generation in order to minimize the difference between the power of distributed power short-term prediction model is designed. The proposed model for prediction of short-term combining the physical models and statistical models were produced in a physical model of the predicted value predicted by the lattice points within the branch prediction to extract the value of a physical model by applying the estimated value of a statistical model for estimating power generation final gas phase produces a predicted value. Also, the proposed model in real-time National Weather Service forecast for medium-term and real-time observations used as input data to perform the short-term prediction models.
Keywords
IMD; Key Distribution; Protocol; RSA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Jansen, and T. Grance(2011), "Guidelines on Security and Privacy in Public Cloud Computing".
2 M. Mannan, B. H. Kim, A. Ganjali, and D. Lie(2011), "Unicorn: Two-factor Attestation for data Security", Proc. of the 18th ACM conference on Computer and Communications Security.
3 F. Zhang, J. Chen, H. Chen, and B. Zang(2011), "CloudVisor: Retrofitting Protection of Virtual Machines in Multitenant Cloud with Nested Virtualization", Proc. of 23rd ACM Symposium on Operating Systems Principles.
4 L. Eschenauer and V. D. Gligor(2002), "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, pp. 41-47.
5 Gupta G, Younis M(2003), "Performance Evaluation of Load-Balanced Clustering in Wireless Sensor Networks" In the proc. of 10th International Conference on Telecommunications (ICT 2003), Tahiti, French Polynesia.
6 M. Tatebayashi, N. Matsuzaki, and D. B. Newman(1999), "Key distribution protocol for digital mobile communication systems," Advances in Cryptology-CRYPTO'89, pp. 324-334, INCS Volume 435, Springer-verlag.
7 C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii(1993), "On key distrubution and authentication in mobile radio networks," Advances in Cryptology - euroCrypt'93, pp. 461-465, INCS Volume 765, Springer-verlag.
8 S. Basagni, K. Herrin, D. Bruschi, and E. Rosti(2001). "Secure pebblenets," In Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, ACM Press, pp. 156-163.
9 A. Khalili, et al.(2003), "Toward Secure key Distribution in Truly Ad-Hoc Networks," IEEE SAINT'03, pp. 342-346.
10 L. Echenauer and V. D. Gligor(2002), "A Key-Management scheme for Distributed sensor networks," In Proceedings of the 9th Computer Communication Security, pp.41-47.
11 H. Chan, A. Perrig, and D. Song(2003), "Random key predistribution schemes for Sensor networks," In IEEE Symposium on Research in Security and Privacy, pp.197-213
12 S. Zhu, S. Setia, and S. Jajodia(2002), "A distributed group key managemet protocol for ad hoc networks," Unpublished manuscript, George Mason University.
13 D. W. Kim, J. W. Han, and K. I. Chung(2009), "Trend of Home Device Authentication/Authorization Technology", Weekly IT BRIEF, No. 1329, pp. 1-11.
14 S.Y. Lee, K.B. Yim, K.J. Bae, Taeyoung Jeong, and Jong-Wook Han(2009), "Counterplan of Ubiquitous Home Network Privacy based on Device Authentication and Authorization," Korea Institute of Information Security & Cryptology, Review of KIISC, 18(5), pp.125-131.
15 D. Halperin, T. S. Heydt-Benjamin, B. Ransford et al.(2009), "Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses", in Proc. of SP'08, pp. 129-142.