Subscription Based Architecture For Secured Group Key Management By Using Linear Equation

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Various applications which are running on to a network require communicating of data onto one or many members. Security is the main focused area in group communication, thereby security of data in the groups is one of the main task for controlling and maintaining access. Unfortunately, IP multicast is not providing any security over the group communication. Therefore it is mandatory to have the group communication with common group key. Group key Management is a fundamental mechanism for secured multicast communication. In group communication it is mandatory for security reasons when the user is joining or evicting the group, the group key has to be change so that the user will unable to receive or fetch information or data, that means user will be unable to receive any new information after leaving the group likewise the new user will not be able to fetch the old information or data. The efficiency of the group key communication depends on the computational cost and communicational cost. The cost should be minimum for both join and eviction of users from the group. The proposed model with subscription algorithm in which divide the group in to subgroups like hybrid model on the basis of years, months, days and hours further divide these subgroups in small subscription time intervals. Linear equation is to be used to calculate these intervals by which predicted request is to be calculated. When the new user will join the group according to their subscription time will get the group and rekeying process will occur. After the subscription period get over the whole time interval of sub-group will be discarded so no rekeying is needed that means eviction cost is reduced to almost Zero (0).



  • Keywords

    Cost, Group Key Management, Security, Subscription

  • References

      [1] Sayee Kumar, M. and T. Purusothaman “Hybrid broadcast group management protocol for secure, scalable and efficient group communication” Journal of Computer Science, 11 (2): 344-350, 2015 ISSN: 1549-3636

      [2] R. Siva Ranjani, Dr.D.Lalitha Bhaskari, Dr.P.S.Avadhani, “Current Trends in Group Key Management” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 11, Nov 2011

      [3] R. Velumadhava Rao, K Selvamani, R Elakkiya, “A secure key transfer protocol for group Communication” Advanced Computing: An International Journal (ACIJ), Vol.3, No.6, November 2012

      [4] Mohamed Salah Bouassida and Isabelle Chrisment and Olivier Festor, “Efficient Group Key Management Protocol in MANETs using the Multipoint Relaying Technique”, Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06),2006

      [5] Xiao yuan, Yang, Liqin Wang, Qian Zhang, “A new group key management protocol in WSNs based on secret sharing” , 978-1-4244-4813-5/10/ ©2010 IEEE

      [6] Melisa Hajyvahabzadeh, Elina Eidkhani, Seyedeh Anahita Mortazavi, Alireza Nemaney Pour, “A New Group Key Management Protocol using Code for Key Calculation: CKC”, 978-1-4244-5943-8/10/ ©2010 IEEE

      [7] Mohammed Riyadh Abdmeziem, Djamel Tandjaoui, Imed Romdhani, “A Decentralized Batch-based Group Key Management Protocol for Mobile Internet of Things (DBGK)”, 978-1-5090-0154-5/15 © 2015 IEEE DOI 10.1109/CIT/IUCC/DASC/PICOM.2015.166

      [8] M. Sayee Kumar and Dr. T. Purusothaman, “An Effective Subscription Based Hybrid Cluster Architecture using Confidence Interval for Efficient and Scalable Communication”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 9, Number 21 (2014) pp. 10689-10702 © Research India Publications,2014.

      [9] Aparna S. Pande, Ravindra. C. Thool, “Survey on Logical Key Hierarchy for secure group communication”, IEEE 978-1-5090-2081-2, 16 March 2017.

      [10] Wong, C.K., M. Gouda and S.S. Lam, 2000. Secure group communications using key graphs. IEEE/ACM Trans. Network., 8: 16-30. DOI: 10.1109/90.836475

      [11] Saroit, I.A. S.F. El-Zoghdy and M. Matar, 2009. A scalable and distributed security protocol for multicast communications. Int. J. Network Secur., 12: 61-74

      [12] Rafaeli, S. and D. Hutchison, 2003. A survey of key management for secure group communication. ACM Comput. Survey, 35: 309-329. DOI: 10.1145/937503.937506

      [13] Pour, A.N., K. Kumekawa, T. Kato and S. Itoh, 2007. A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. Comput. Networks, 51: 4727-4743. DOI: 10.1016/j.comnet.2007.07.007

      [14] Poovendran, M.L.R. and D.A. McGrew, 2004. Minimizing center key storage in hybrid one-way function based group key management with communication constraints. Inform. Proc. Lett., 93: 191-198. DOI: 10.1016/j.ipl.2004.10.012

      [15] Lee, F.Y. and S. Shieh, 2004. Scalable and lightweight key distribution for secure group communications. Int. J. Network Manage., 3: 167-176. DOI: 10.1002/nem.515




Article ID: 28564
DOI: 10.14419/ijet.v7i4.6.28564

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.