Skip to main content
Top
Published in: The Journal of Supercomputing 3/2013

01-09-2013

Hierarchical approaches for multicast based on Euclid’s algorithm

Authors: J. A. Álvarez-Bermejo, N. Antequera, J. A. López-Ramos

Published in: The Journal of Supercomputing | Issue 3/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We introduce a hierarchical approach for secure multicast where rekeying of groups of users is made through a method based on Euclid’s algorithm for computing GCD. We consider tree arrangements of users that decrease requirements on bandwidth as protocols of the same nature, but also show that computational requirements are less than in other similar approaches. We also introduce a distributed protocol by groups with group managers that not only helps to decrease size of rekeying messages with respect to a centralized approach, but also to increase the security level concerning authentication of users and distributed information.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Antequera N, Lopez-Ramos JA (2011) Remarks and countermeasures on a cryptanalysis of a secure multicast protocol. In: Proceedings of 7th international conference on next generation web services practices, Salamanca 2011, Salamanca (Spain), pp 201–205 Antequera N, Lopez-Ramos JA (2011) Remarks and countermeasures on a cryptanalysis of a secure multicast protocol. In: Proceedings of 7th international conference on next generation web services practices, Salamanca 2011, Salamanca (Spain), pp 201–205
2.
go back to reference Antequera N, Garcia-Rubio R, Lopez-Ramos JA (2013) Secure auditing and e-commerce. Int J Comput Inf Syst Ind Manag Appl 5:581–588. ISSN 2150-7988 Antequera N, Garcia-Rubio R, Lopez-Ramos JA (2013) Secure auditing and e-commerce. Int J Comput Inf Syst Ind Manag Appl 5:581–588. ISSN 2150-7988
3.
go back to reference Bierstaker JL, Burnaby P, Thibodeau J (2001) The impact of information technology on the audit process: an assessment of the state of the art and implications for the future. Manag Audit J 16(3):159–164 CrossRef Bierstaker JL, Burnaby P, Thibodeau J (2001) The impact of information technology on the audit process: an assessment of the state of the art and implications for the future. Manag Audit J 16(3):159–164 CrossRef
4.
go back to reference Chan K-C, Chan S-HG (2003) Key management approaches to offer data confidentiality for secure multicast. IEEE Netw 17(5):30–39 CrossRef Chan K-C, Chan S-HG (2003) Key management approaches to offer data confidentiality for secure multicast. IEEE Netw 17(5):30–39 CrossRef
5.
go back to reference Chiou G, Chen W (1989) Secure broadcasting using the secure lock. IEEE Trans Softw Eng 15(8):929–934 CrossRef Chiou G, Chen W (1989) Secure broadcasting using the secure lock. IEEE Trans Softw Eng 15(8):929–934 CrossRef
6.
go back to reference Dalci I, Tanis VN (2002) Benefits of computerized accounting information systems on the JIT production systems. Rev Soc Econ Bus Stud 2:45–64 Dalci I, Tanis VN (2002) Benefits of computerized accounting information systems on the JIT production systems. Rev Soc Econ Bus Stud 2:45–64
7.
go back to reference Di Pietro R, Mancini LV, Jajodia S (2002) Efficient and secure keys management for wireless mobile communications. In: Proceedings of POMC 2002, pp 66–73 Di Pietro R, Mancini LV, Jajodia S (2002) Efficient and secure keys management for wireless mobile communications. In: Proceedings of POMC 2002, pp 66–73
8.
go back to reference Glover S, Romney M (1998) The next generation software. Intern Aud 55(4):47–53 Glover S, Romney M (1998) The next generation software. Intern Aud 55(4):47–53
9.
go back to reference Janakova M (2011) Database technology analysis for the support or instant information retrieval. Int J Comput Inf Syst Ind Manag Appl 3:586–593 Janakova M (2011) Database technology analysis for the support or instant information retrieval. Int J Comput Inf Syst Ind Manag Appl 3:586–593
10.
go back to reference Kale LV, Zheng G (2009) Charm++ and AMPI: adaptive runtime strategies via migratable objects. In: Advanced computational infrastructures for parallel and distributed applications. Wiley-Interscience, New York Kale LV, Zheng G (2009) Charm++ and AMPI: adaptive runtime strategies via migratable objects. In: Advanced computational infrastructures for parallel and distributed applications. Wiley-Interscience, New York
11.
go back to reference Kruus PS, Macker JP (1998) Techniques and issues in multicast security. In: Proceedings of military communications conference, MILCOM, pp 1028–1032 Kruus PS, Macker JP (1998) Techniques and issues in multicast security. In: Proceedings of military communications conference, MILCOM, pp 1028–1032
12.
go back to reference Liu B, Zhang W, Jiang T (2004) A scalable key distribution scheme for conditional access system in digital pay-TV system. IEEE Trans Consum Electron 50(2):632–637 CrossRef Liu B, Zhang W, Jiang T (2004) A scalable key distribution scheme for conditional access system in digital pay-TV system. IEEE Trans Consum Electron 50(2):632–637 CrossRef
13.
go back to reference Maulik R, Chaki N (2011) A study on wormhole attacks in MANET. Int J Comput Inf Syst Ind Manag Appl 3:271–279 Maulik R, Chaki N (2011) A study on wormhole attacks in MANET. Int J Comput Inf Syst Ind Manag Appl 3:271–279
14.
go back to reference Mittra S (1997) Iolus: a framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM, New York, Sept. ACM, New York, pp 277–288. 27(4) CrossRef Mittra S (1997) Iolus: a framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM, New York, Sept. ACM, New York, pp 277–288. 27(4) CrossRef
16.
go back to reference Peinado A, Ortiz A (2011) Cryptanalysis of multicast protocols with key refreshment based on the extended Euclidean algorithm. In: Proceedings of CISIS 2011. Lecture notes in computer sciences, vol 6694, pp 177–182 Peinado A, Ortiz A (2011) Cryptanalysis of multicast protocols with key refreshment based on the extended Euclidean algorithm. In: Proceedings of CISIS 2011. Lecture notes in computer sciences, vol 6694, pp 177–182
17.
go back to reference Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329 CrossRef Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329 CrossRef
18.
go back to reference Scheikl O, Lane J, Boyer R, Eltoweissy M (2002) Multi-level secure multicast: the rethinking of secure locks. In: International conference on parallel processing workshops, 2002, proceedings, pp 17–24 Scheikl O, Lane J, Boyer R, Eltoweissy M (2002) Multi-level secure multicast: the rethinking of secure locks. In: International conference on parallel processing workshops, 2002, proceedings, pp 17–24
19.
go back to reference Sherman AT, McGrew DA (2003) Key establishment in large dynamic groups using one-way function trees. IEEE Trans Softw Eng 29:444–458 CrossRef Sherman AT, McGrew DA (2003) Key establishment in large dynamic groups using one-way function trees. IEEE Trans Softw Eng 29:444–458 CrossRef
20.
go back to reference Ukil A (2011) Context protecting privacy preservation in ubiquitous computing. Int J Comput Inf Syst Ind Manag Appl 3:228–235 Ukil A (2011) Context protecting privacy preservation in ubiquitous computing. Int J Comput Inf Syst Ind Manag Appl 3:228–235
21.
go back to reference Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B (1999) The VersaKey framework: versatile group key management. IEEE J Sel Areas Commun 17(9):1614–1631 CrossRef Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B (1999) The VersaKey framework: versatile group key management. IEEE J Sel Areas Commun 17(9):1614–1631 CrossRef
22.
go back to reference Wallner D, Harder E, Agee R (1999) Key management for multicast: issues and architectures. RFC 2627 Wallner D, Harder E, Agee R (1999) Key management for multicast: issues and architectures. RFC 2627
23.
go back to reference Zhu S, Jajodia S (2010) Scalable group key management for secure multicast: a taxonomy and new directions. In: Huang H, MacCallum D, Du D-Z (eds) Network security. Springer, New York, pp 57–75 CrossRef Zhu S, Jajodia S (2010) Scalable group key management for secure multicast: a taxonomy and new directions. In: Huang H, MacCallum D, Du D-Z (eds) Network security. Springer, New York, pp 57–75 CrossRef
Metadata
Title
Hierarchical approaches for multicast based on Euclid’s algorithm
Authors
J. A. Álvarez-Bermejo
N. Antequera
J. A. López-Ramos
Publication date
01-09-2013
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 3/2013
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-013-0923-x

Other articles of this Issue 3/2013

The Journal of Supercomputing 3/2013 Go to the issue

Premium Partner