Key-update distribution in secure group communication

被引:11
|
作者
Kulkarni, Sandeep S. [1 ]
Bruhadeshwar, Bezawada [2 ]
机构
[1] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
[2] Int Inst Informat Technol, Gachibowli 500019, Hyderbad, India
基金
美国国家科学基金会;
关键词
Secure group communication; Key-update distribution; Descendent tracking; Identifier assignment; Secure interval multicast; MULTICAST; MANAGEMENT;
D O I
10.1016/j.comcom.2009.11.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We focus on the problem of distributing key updates in secure dynamic group communication. In secure groups, to reflect changing group membership, the group controller needs to change and distribute new keys to ensure confidentiality of the group communication. However, in the current key management algorithms, which include the well-known logical key hierarchical algorithms, the group controller broadcasts all key updates even if only a Subset of users need them. In this paper, we describe key-update distribution algorithms for distributing keys to only those users who need them. Our algorithms consist of a descendant tracking scheme - to track downstream users in the multicast tree and forwarding mechanisms - to forward key updates using the descendant tracking information. The forwarding mechanisms, in turn, depend on the type of key management algorithm used by the group controller. Using our descendant tracking scheme, a node forwards an encrypted key update only if it believes that there are descendents who know the encrypting key which enables them to decrypt the required key update. Our descendant tracking scheme requires minimal state overhead, of the order of log N bits for a group of N users, to be stored at the intermediate nodes in the multicast tree. We also describe an identifier assignment algorithm that assigns closely clustered logical identifiers to users who are in physical proximity in the multicast tree. Our identifier assignment algorithms leverages the fact that logically clustered users require the approximately same set of key updates. We show that our identifier assignment algorithm improves the performance of our key update distribution algorithms as well as that of a previous solution. Furthermore, we show that, Our proposed algorithms reduce the cost of secure data distribution in applications where data needs to be sent securely to only a subset of the group users. To validate our algorithms, we tested them on different key management algorithms for distributing key updates and data. Our simulations results show that a bandwidth reduction of up to 55%, compared to broadcast, is achieved by our algorithms. We also discuss implications of topology matching and logical key tree balancing on Our key distribution algorithm and show that it is possible to achieve bandwidth saving up to 90% by combining all three techniques. (C) 2010 Published by Elsevier B.V.
引用
收藏
页码:689 / 705
页数:17
相关论文
共 50 条
  • [1] Optimal Key Distribution Scheme for Secure Multicast Group Communication
    Zhou, Zhibin
    Huang, Dijiang
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [2] Analysis and Improvement of Key Distribution Scheme for Secure Group Communication
    Luo, Jia Ning
    Yang, Ming Hour
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016
  • [3] Comparison of scalable key distribution schemes for secure group communication
    Dondeti, LR
    Mukherjee, S
    Samal, A
    [J]. GLOBECOM'99: SEAMLESS INTERCONNECTION FOR UNIVERSAL SERVICES, VOL 1-5, 1999, : 1774 - 1778
  • [4] Key management and key distribution for secure group communication in mobile and cloud network
    Vijayakumar, P.
    Chang, Victor
    Deborah, L. Jegatha
    Kshatriya, Bharat S. Rawal
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 123 - 125
  • [5] Secure Group Communication with Hidden Group Key
    Bhatia, Manjot
    Muttoo, Sunil Kumar
    Bhatia, M. P. S.
    [J]. INFORMATION SECURITY JOURNAL, 2013, 22 (01): : 21 - 34
  • [6] An efficient key-update scheme for wireless sensor networks
    Wang, Chien-Lung
    Horng, Gwoboa
    Chen, Yu-Sheng
    Hong, Tzung-Pei
    [J]. COMPUTATIONAL SCIENCE - ICCS 2006, PT 1, PROCEEDINGS, 2006, 3991 : 1026 - 1029
  • [7] Secure group key distribution protocols
    Chen, X
    Shen, J
    [J]. PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2002, : 307 - 311
  • [8] Distribution Function Based Efficient Secure Group Communication Using Key Tree
    Shanu, Piyush Kumar
    Chandrasekaran, K.
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2016,
  • [9] Key Management in Efficient and Secure Group Communication
    Yadav, Manisha
    Singh, Karan
    Pandey, Ajay Shekhar
    [J]. 2016 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ELECTRONICS & SUSTAINABLE ENERGY SYSTEMS (ICETEESES), 2016, : 196 - 203
  • [10] A survey of key management for secure group communication
    Rafaeli, S
    Hutchison, D
    [J]. ACM COMPUTING SURVEYS, 2003, 35 (03) : 309 - 329