Skip to main content
Erschienen in: The Journal of Supercomputing 3/2013

01.09.2013

Hierarchical approaches for multicast based on Euclid’s algorithm

verfasst von: J. A. Álvarez-Bermejo, N. Antequera, J. A. López-Ramos

Erschienen in: The Journal of Supercomputing | Ausgabe 3/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We introduce a hierarchical approach for secure multicast where rekeying of groups of users is made through a method based on Euclid’s algorithm for computing GCD. We consider tree arrangements of users that decrease requirements on bandwidth as protocols of the same nature, but also show that computational requirements are less than in other similar approaches. We also introduce a distributed protocol by groups with group managers that not only helps to decrease size of rekeying messages with respect to a centralized approach, but also to increase the security level concerning authentication of users and distributed information.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Antequera N, Lopez-Ramos JA (2011) Remarks and countermeasures on a cryptanalysis of a secure multicast protocol. In: Proceedings of 7th international conference on next generation web services practices, Salamanca 2011, Salamanca (Spain), pp 201–205 Antequera N, Lopez-Ramos JA (2011) Remarks and countermeasures on a cryptanalysis of a secure multicast protocol. In: Proceedings of 7th international conference on next generation web services practices, Salamanca 2011, Salamanca (Spain), pp 201–205
2.
Zurück zum Zitat Antequera N, Garcia-Rubio R, Lopez-Ramos JA (2013) Secure auditing and e-commerce. Int J Comput Inf Syst Ind Manag Appl 5:581–588. ISSN 2150-7988 Antequera N, Garcia-Rubio R, Lopez-Ramos JA (2013) Secure auditing and e-commerce. Int J Comput Inf Syst Ind Manag Appl 5:581–588. ISSN 2150-7988
3.
Zurück zum Zitat Bierstaker JL, Burnaby P, Thibodeau J (2001) The impact of information technology on the audit process: an assessment of the state of the art and implications for the future. Manag Audit J 16(3):159–164 CrossRef Bierstaker JL, Burnaby P, Thibodeau J (2001) The impact of information technology on the audit process: an assessment of the state of the art and implications for the future. Manag Audit J 16(3):159–164 CrossRef
4.
Zurück zum Zitat Chan K-C, Chan S-HG (2003) Key management approaches to offer data confidentiality for secure multicast. IEEE Netw 17(5):30–39 CrossRef Chan K-C, Chan S-HG (2003) Key management approaches to offer data confidentiality for secure multicast. IEEE Netw 17(5):30–39 CrossRef
5.
Zurück zum Zitat Chiou G, Chen W (1989) Secure broadcasting using the secure lock. IEEE Trans Softw Eng 15(8):929–934 CrossRef Chiou G, Chen W (1989) Secure broadcasting using the secure lock. IEEE Trans Softw Eng 15(8):929–934 CrossRef
6.
Zurück zum Zitat Dalci I, Tanis VN (2002) Benefits of computerized accounting information systems on the JIT production systems. Rev Soc Econ Bus Stud 2:45–64 Dalci I, Tanis VN (2002) Benefits of computerized accounting information systems on the JIT production systems. Rev Soc Econ Bus Stud 2:45–64
7.
Zurück zum Zitat Di Pietro R, Mancini LV, Jajodia S (2002) Efficient and secure keys management for wireless mobile communications. In: Proceedings of POMC 2002, pp 66–73 Di Pietro R, Mancini LV, Jajodia S (2002) Efficient and secure keys management for wireless mobile communications. In: Proceedings of POMC 2002, pp 66–73
8.
Zurück zum Zitat Glover S, Romney M (1998) The next generation software. Intern Aud 55(4):47–53 Glover S, Romney M (1998) The next generation software. Intern Aud 55(4):47–53
9.
Zurück zum Zitat Janakova M (2011) Database technology analysis for the support or instant information retrieval. Int J Comput Inf Syst Ind Manag Appl 3:586–593 Janakova M (2011) Database technology analysis for the support or instant information retrieval. Int J Comput Inf Syst Ind Manag Appl 3:586–593
10.
Zurück zum Zitat Kale LV, Zheng G (2009) Charm++ and AMPI: adaptive runtime strategies via migratable objects. In: Advanced computational infrastructures for parallel and distributed applications. Wiley-Interscience, New York Kale LV, Zheng G (2009) Charm++ and AMPI: adaptive runtime strategies via migratable objects. In: Advanced computational infrastructures for parallel and distributed applications. Wiley-Interscience, New York
11.
Zurück zum Zitat Kruus PS, Macker JP (1998) Techniques and issues in multicast security. In: Proceedings of military communications conference, MILCOM, pp 1028–1032 Kruus PS, Macker JP (1998) Techniques and issues in multicast security. In: Proceedings of military communications conference, MILCOM, pp 1028–1032
12.
Zurück zum Zitat Liu B, Zhang W, Jiang T (2004) A scalable key distribution scheme for conditional access system in digital pay-TV system. IEEE Trans Consum Electron 50(2):632–637 CrossRef Liu B, Zhang W, Jiang T (2004) A scalable key distribution scheme for conditional access system in digital pay-TV system. IEEE Trans Consum Electron 50(2):632–637 CrossRef
13.
Zurück zum Zitat Maulik R, Chaki N (2011) A study on wormhole attacks in MANET. Int J Comput Inf Syst Ind Manag Appl 3:271–279 Maulik R, Chaki N (2011) A study on wormhole attacks in MANET. Int J Comput Inf Syst Ind Manag Appl 3:271–279
14.
Zurück zum Zitat Mittra S (1997) Iolus: a framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM, New York, Sept. ACM, New York, pp 277–288. 27(4) CrossRef Mittra S (1997) Iolus: a framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM, New York, Sept. ACM, New York, pp 277–288. 27(4) CrossRef
16.
Zurück zum Zitat Peinado A, Ortiz A (2011) Cryptanalysis of multicast protocols with key refreshment based on the extended Euclidean algorithm. In: Proceedings of CISIS 2011. Lecture notes in computer sciences, vol 6694, pp 177–182 Peinado A, Ortiz A (2011) Cryptanalysis of multicast protocols with key refreshment based on the extended Euclidean algorithm. In: Proceedings of CISIS 2011. Lecture notes in computer sciences, vol 6694, pp 177–182
17.
Zurück zum Zitat Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329 CrossRef Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329 CrossRef
18.
Zurück zum Zitat Scheikl O, Lane J, Boyer R, Eltoweissy M (2002) Multi-level secure multicast: the rethinking of secure locks. In: International conference on parallel processing workshops, 2002, proceedings, pp 17–24 Scheikl O, Lane J, Boyer R, Eltoweissy M (2002) Multi-level secure multicast: the rethinking of secure locks. In: International conference on parallel processing workshops, 2002, proceedings, pp 17–24
19.
Zurück zum Zitat Sherman AT, McGrew DA (2003) Key establishment in large dynamic groups using one-way function trees. IEEE Trans Softw Eng 29:444–458 CrossRef Sherman AT, McGrew DA (2003) Key establishment in large dynamic groups using one-way function trees. IEEE Trans Softw Eng 29:444–458 CrossRef
20.
Zurück zum Zitat Ukil A (2011) Context protecting privacy preservation in ubiquitous computing. Int J Comput Inf Syst Ind Manag Appl 3:228–235 Ukil A (2011) Context protecting privacy preservation in ubiquitous computing. Int J Comput Inf Syst Ind Manag Appl 3:228–235
21.
Zurück zum Zitat Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B (1999) The VersaKey framework: versatile group key management. IEEE J Sel Areas Commun 17(9):1614–1631 CrossRef Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B (1999) The VersaKey framework: versatile group key management. IEEE J Sel Areas Commun 17(9):1614–1631 CrossRef
22.
Zurück zum Zitat Wallner D, Harder E, Agee R (1999) Key management for multicast: issues and architectures. RFC 2627 Wallner D, Harder E, Agee R (1999) Key management for multicast: issues and architectures. RFC 2627
23.
Zurück zum Zitat Zhu S, Jajodia S (2010) Scalable group key management for secure multicast: a taxonomy and new directions. In: Huang H, MacCallum D, Du D-Z (eds) Network security. Springer, New York, pp 57–75 CrossRef Zhu S, Jajodia S (2010) Scalable group key management for secure multicast: a taxonomy and new directions. In: Huang H, MacCallum D, Du D-Z (eds) Network security. Springer, New York, pp 57–75 CrossRef
Metadaten
Titel
Hierarchical approaches for multicast based on Euclid’s algorithm
verfasst von
J. A. Álvarez-Bermejo
N. Antequera
J. A. López-Ramos
Publikationsdatum
01.09.2013
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 3/2013
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-013-0923-x

Weitere Artikel der Ausgabe 3/2013

The Journal of Supercomputing 3/2013 Zur Ausgabe

Premium Partner