Computer Science ›› 2014, Vol. 41 ›› Issue (5): 41-45.doi: 10.11896/j.issn.1002-137X.2014.05.009

Previous Articles     Next Articles

Multiway Tree-based Group Key Management Scheme for Multi-privileged Group Communications

XU Yang,ZHOU Wei,DU Qiu-shuang and WANG Guo-jun   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In multi-privileged group communications,since users can access multiple data resources according to their different privileges,security issues become more difficult to solve than that in traditional group communications.Therefore,this paper proposed a novel centralized group key management scheme for multi-privileged environments.The proposed scheme employs multiway tree to construct a key graph and assigns a unique ID for every node in the key graph,so that the relationship between keys can be deduced by an ID which will contribute to locating the affected keys efficiently.As a result,the related users can update the affected keys through previous keys or with a rekeying material by using a one-way function when membership changes dynamically.Theoretical analysis and experimental simulation results show that the proposed scheme can reduce the storage and rekeying overhead efficiently,and it outperforms some previous schemes.Meanwhile,the forward and backward security is also guaranteed.

[1] Rafaeli S,Hutchison D.A Survey of Key Management for Se-cure Group Communication[J].ACM Computing Surveys,2003,35(3):309-329
[2] Trappe W,Song J,Poovendran R,et al.Key distribution for secure multimedia multicasts via data embedding[C]∥Proceedings of the Acoustics,Speech,and Signal Processing.Salt Lake City:IEEE Signal Processing Society,2001:1449-1452
[3] Wong C K,Gouda M,Lam S.Secure Group Communications Using Key Graphs[J].IEEE/ACM Transactions on Networking,2000,8(1):16-30
[4] 许建真,董永先,梁克会.一种高效的动态组播密钥管理方案[J].计算机应用研究,2010,27(3):1061-1063
[5] 张志军,郭渊博,刘伟,等.基于m叉树与DH协议的组密钥协商协议[J].计算机工程,2010,36(1):161-163
[6] Sun Y,Liu K J R.Scalable hierarchical access control in secure group communications[J].Proceedings of IEEE INFOCOM’04,2004,2(7-11):1296-1306
[7] 欧阳洁,王国军.基于单向函数的多权限群组密钥管理协议[J].计算机工程,2008,34(8):156-158
[8] Wang G,Ouyang J,Chen H,et al.Efficient group key management for multi-privileged groups[J].Computer Communications,Elsevier,2007,30(11/12):2497-2509
[9] Eskicioglu A M,Dexter S,Delp E J.Protection of MulticastScalable Video by Secret Sharing:Simulation Results[C]∥Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents.Santa Clara,USA:the International Society for Optical Engineering,2003,7:505-515
[10] Lin J C,Lai P F,Lee H C.Efficient group key management protocol with one-way key derivation[C]∥Proceedings of IEEE conference on Local Computer Networks 30th Anniversary.2005:336-343
[11] Muthulakshmi A,Anitha R,Sumathi M.Non-split balancinghigher order tree for multi-privileged groups[J].WSEAS Transactions on Communications,2011,10(10):308-321
[12] Muthulakshmi A,Anitha R.Balanced key tree management for multi-privileged groups using(N,T) policy[J].Security and Communication Networks,2012,5(5):545-555
[13] Cruz J R P,Hernandez S E P,Gomez G R,et al.Multi-session key management scheme for multimedia group communications[J].Journal of Internet Technology,2012,1(1):67-78

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!