Enhancing identity trust in cryptographic key management systems for dynamic environments

被引:2
|
作者
Kayem, Anne V. D. M. [1 ]
Martin, Patrick [2 ]
Akl, Selim G. [2 ]
机构
[1] German Res Ctr Artificial Intelligence DFKI, D-28359 Bremen, Germany
[2] Queens Univ, Sch Comp, Kingston, ON K7L 3N6, Canada
关键词
key management; collusion attack; identity trust; autonomic computing; NP-complete; ACCESS-CONTROL; ASSIGNMENT SCHEME; SECURITY;
D O I
10.1002/sec.164
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic key management (CKM) schemes can be used to support identity management (IM) systems where linking users securely to data objects is important. CKM schemes enforce data security by encrypting data granting access only to authorized users and security compromises are prevented by updating any keys that are held by users from whom access rights have been revoked. Handling key updates efficiently and providing security against collusion attacks is challenging in dynamic environments like the Internet where manual Security management increases the likelihood of delayed responses. Delay increases the system's vulnerability to security attacks and the potential of the system's violating its service level agreements. Adaptive CKM has emerged as a possibility of addressing this problem but needs to be designed in a way that justifies the cost/benefit tradeoff. In this paper, we show that the key update and collusion avoidance problems are NP-complete and need heuristic algorithms to prevent performance degradations in comparison to standard CKM schemes. As an example of the benefits of a good heuristic, we present a collusion detection and resolution algorithm whose running time is polynomial in the number of keys. The algorithm operates by mapping the generated key set onto a key graph whose independent set is computed. In the key graph, the vertices represent the keys and the edges the probability that their endpoints can be combined to provoke a collusion attack. Collusion possibilities are resolved by applying a heuristic that resets the probability to zero. The performance of our algorithm is analyzed in comparison to the Akl and Taylor scheme that is secure against collusion attack, and the experimental results indicate that collusion prevention can be done dynamically without affecting performance. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:79 / 94
页数:16
相关论文
共 50 条
  • [1] Injecting Trust to Cryptographic Key Management
    Bal, Goekhan
    Schmidt, Andreas U.
    Kuntze, Nicolai
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1197 - +
  • [2] A FRAMEWORK FOR SECURE CRYPTOGRAPHIC KEY MANAGEMENT SYSTEMS
    Varalakshmi, P.
    Shajina, A. R.
    Kanimozhi, T.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 319 - 323
  • [3] Cryptographic Key Management for SCADA Systems, Issues and Perspectives
    Pietre-Cambacedes, Ludovic
    Sitbon, Pascal
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (03): : 31 - 40
  • [4] Cryptographic key management for SCADA systems -: issues and perspectives
    Pietre-Cambacedes, Ludovic
    Sitbon, Pascal
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 156 - 161
  • [5] LIFETIMES OF KEYS IN CRYPTOGRAPHIC KEY MANAGEMENT-SYSTEMS
    OKAMOTO, E
    NAKAMURA, K
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 246 - 259
  • [6] On replacing cryptographic keys in hierarchical key management systems
    Kayem, Anne
    Akl, Selim
    Martin, Patrick
    JOURNAL OF COMPUTER SECURITY, 2008, 16 (03) : 289 - 309
  • [7] Enhancing Privacy in Identity Management Systems
    Gevers, Steven
    Verslype, Kristof
    De Decker, Bart
    WPES'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON PRIVACY IN ELECTRONIC SOCIETY, 2007, : 60 - 63
  • [8] Efficient and dynamic key management for multiple identities in identity-based systems
    Guo, Hua
    Xu, Chang
    Li, Zhoujun
    Yao, Yanqing
    Mu, Yi
    INFORMATION SCIENCES, 2013, 221 : 579 - 590
  • [9] Introduction to the Minitrack on Trust, Identity, and Trusted Systems in Digital Environments
    Jarvenpaa, Sirkka L.
    Teigland, Robin
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 5382 - 5383
  • [10] Cryptographic key management for the masses
    Potter, Bruce
    Network Security, 2006, 2006 (12) : 13 - 14