A Role-based Secure Group Communication Framework

被引:0
|
作者
Bian, Jiang [1 ]
Topaloglu, Umit [1 ]
Seker, Remzi [1 ]
Bayrak, Coskun [1 ]
Chiang, Chia-Chu [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci, Little Rock, AR 72204 USA
关键词
Secure group communication; role-based system; group conference key; hashed key chain;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Building a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not much work published on easily manageable, simple, and effective systems that can provide secure communication in a role-based environment. In this paper, we propose a comprehensive solution to the key exchange problem for group communication. A centralized key server is used to produce a key chain, based on recursive hashing, and securely distributing the keys to the recipients according to their roles. The proposed work makes it possible that a user with a higher clearance can audit the communications among the users that are hierarchically below him/her. Moreover, the system has the ability to isolate communications among different groups, which means the compartmentation is reserved.
引用
收藏
页码:111 / 116
页数:6
相关论文
共 50 条
  • [21] Towards secure information sharing using role-based delegation
    Ahn, Gall-Joon
    Mohan, Badrinath
    Hong, Seng-Phil
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) : 42 - 59
  • [22] B-ERAC: BLOCKCHAIN-ENABLED ROLE-BASED ACCESS CONTROL FOR SECURE IOT DEVICE COMMUNICATION
    Khan, Neelam Saleem
    Mir, Roohie Naaz
    Chishti, Mohammad Ahsan
    Saleem, Mahreen
    [J]. Scalable Computing, 2024, 25 (06): : 5649 - 5671
  • [23] Towards a role-based framework approach for user interfaces
    Renouf, DW
    HendersonSellers, B
    [J]. AUSTRALIAN COMPUTER JOURNAL, 1996, 28 (03): : 96 - 106
  • [24] A role-based framework for multi-agent teaming
    Leng, Jinsong
    Li, Jiuyong
    Jain, Lakhmi C.
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 642 - +
  • [25] RT:: A role-based trust-management framework
    Li, NH
    Mitchell, JC
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, : 201 - 212
  • [26] Towards a role-based framework for distributed systems management
    Lupu E.C.
    Sloman M.
    [J]. Journal of Network and Systems Management, 1997, 5 (1) : 5 - 30
  • [27] Design of a role-based trust-management framework
    Li, NH
    Mitchell, JC
    Winsborough, WH
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 114 - 130
  • [28] A Secure Role-based Service Discovery Technique for Emergency Intervention Operations
    Serhani, M. Adel
    Barka, Ezedin
    Gadallah, Yasser
    [J]. 2015 FOURTH INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT), 2015,
  • [29] A Secure e-Governance Model Using Role-Based Delegation
    Bannore, Aparna
    Devane, Satish
    [J]. THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, 797 : 911 - 919
  • [30] Role-based Enhancement of Secure Authentication for RF-UCard Systems
    Cao, Jichang
    Shu, Lin
    Lu, Zhengding
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2891 - 2894