A novel high-order tree for secure multicast key management

被引:26
|
作者
Lu, HB [1 ]
机构
[1] Univ Missouri, Dept Comp Sci, Columbia, MO 65211 USA
关键词
group key management; secure multicast; dynamic group; high-order tree; balanced tree; rekeying;
D O I
10.1109/TC.2005.15
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multicast is used to deliver packets to a group of users. To prevent users outside the group from eavesdropping, a group key is maintained to encrypt the group communication, and the group key is changed (rekeying) when a new member joins the group or an existing member leaves the group. Rekeying costs could be as high as n for a group with n members. The hierarchical key-tree approach is widely used to achieve logarithmic rekeying costs. However, the key tree has to be kept balanced in order to keep logarithmic rekeying costs. Goshi and Ladner [8] propose the height-balanced 2-3 tree (a B-tree of order m = 3) and found that it has the best performance among the balancing strategies tested. However, balancing a B-tree [8] after member joining involves splitting oversized tree nodes and results in (m + 2)h worst-case rekeying cost, where h is the tree height. We propose an NSBHO (Non-Split Balancing High-Order) tree in which balancing tree after member joining does not involve node splitting, thus having 2h worst-case rekeying cost. An NSBHO tree is always balanced and its nodes may not satisfy the node properties of a standard B-tree. Our proposed NSBHO tree has the same worst-case rekeying cost incurred by a member removing as a B-tree [8] does. Our experiments show that the NSBHO tree has better average-case rekeying performance and far superior worst-case rekeying performance than a B-tree.
引用
收藏
页码:214 / 224
页数:11
相关论文
共 50 条
  • [1] Optimizing the tree structure in secure multicast key management
    Zhu, WT
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (05) : 477 - 479
  • [2] Dynamic balanced key tree management for secure multicast communications
    Ng, Wee Hock Desmond
    Howarth, Michael
    Sun, Zhili
    Cruickshank, Haitham
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2007, 56 (05) : 590 - 605
  • [3] A novel key management and distribution solution for secure video multicast
    Yin, H
    Chu, XW
    Lin, C
    Qiu, F
    Min, GY
    [J]. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2005, PT 2, 2005, 3768 : 246 - 257
  • [4] Key management for secure overlay multicast
    Roh, JH
    Lee, KH
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 336 - 345
  • [5] Optimal tree structure for key management of simultaneous join/leave in secure multicast
    Zhu, F
    Chan, A
    Noubir, G
    [J]. MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 773 - 778
  • [6] A dynamic core-based tree scheme for key management in secure multicast
    Xu, ZQ
    Chen, L
    [J]. NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS II, PTS 1 AND 2, 2005, 5626 : 805 - 812
  • [7] A novel batch rekeying processor architecture for secure multicast key management
    Shoufan, A
    Huss, SA
    Cutleriwala, M
    [J]. HIGH PERFORMANCE EMBEDDED ARCHITECTURES AND COMPILERS, PROCEEDINGS, 2005, 3793 : 169 - 183
  • [8] A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
    Sriprasadh, K.
    Saicharansrinivasan
    Pandithurai, O.
    Saravanan, A.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 305 - 311
  • [9] Minimum redundancy tree for key distribution in secure multicast
    Chan, SP
    Kok, CW
    [J]. 2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 171 - 171
  • [10] Computation-and-storage-efficient key tree management protocol for secure multicast communications
    Je, Dong-Hyun
    Lee, Jun-Sik
    Park, Yongsuk
    Seo, Seung-Woo
    [J]. COMPUTER COMMUNICATIONS, 2010, 33 (02) : 136 - 148