Skip to main content
Log in

A scalable server for key distribution and its application to accounting

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Media distribution over the Internet is a fact. Finding a way to protect content streaming is a hot topic. This paper presents both a new and efficient key multicasting protocol based on the use of orthogonal systems in vector spaces, and its scalable implementation by means of a platform independent server. The protocol outstands in exchanging a small number of tiny messages which helps the server to scale when facing a huge number of legitimate users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Janakova M (2011) Database technology analysis for the support or instant information retrieval. Int J Comput Inf Syst Ind Manag Appl 3:586–593

    Google Scholar 

  2. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2011–2016, White Paper, Cisco, June, 2011, http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.pdf

  3. Yamakami T (2003) Toward understanding the mobile Internet user behavior: a methodology for user clustering with aging analysis. In: Parallel and distributed computing, applications and technologies, pp 85–89

    Google Scholar 

  4. Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329

    Article  Google Scholar 

  5. Shoufan A, Huss SA (2009) High-performance rekeying processor architecture for group key management. IEEE Trans Comput 58:1421–1434

    Article  MathSciNet  Google Scholar 

  6. Hssane AB, Hasnaoui ML, Benkirane S, Ezzati A, Benalla S (2011) Modified Gram Schmidt algorithm applied to localization for wireless sensor networks. In: International conference on multimedia computing and systems (ICMCS), 7–9 April 2011, pp 1–5

    Google Scholar 

  7. Yin J, Dong F, Wang N (2009) Modified Gram–Schmidt algorithm for extreme learning machine. In: Second international symposium on computational intelligence and design, 12–14 Dec 2009. ISCID ’09, vol 2, pp 517–520

    Chapter  Google Scholar 

  8. Lopez-Ramos JA, Rosenthal J, Schipani D (2010) Managing key multicasting through orthogonal systems. Preprint

  9. Ardnt H (2010) The universal Java matrix package: everything is a matrix! ICML/MLOSS, Haifa, 2010-06-25

  10. Widdows D, Cohen T (2010) The semantic vectors package: new algorithms and public tools for distributional semantics. In: IEEE fourth international conference on semantic computing (ICSC), 22–24 Sept 2010, pp 9–15

    Chapter  Google Scholar 

  11. Fan W, Chen X, Li X (2010) Parallelization of RSA algorithm based on compute unified device architecture. In: 9th International conference on grid and cooperative computing (GCC), 1–5 Nov 2010, pp 174–178

    Google Scholar 

  12. Shavit N (2011) Data structures in the multicore age. Commun ACM 54(3):76–84

    Article  Google Scholar 

  13. Pang W-M, Wong T-T, Heng P-A (2008) Generating massive high-quality random numbers using GPU. In: IEEE world congress on computational intelligence, 1–6 June 2008, pp 841–847

    Google Scholar 

  14. Bierstaker JL, Burnaby P, Thibodeau J (2001) The impact of information technology on the audit process: an assessment of the state of the art and implications for the future. Manag Audit J 16(3):159–164

    Article  Google Scholar 

  15. Church BK, McMillan JJ, Schneider A (2001) Factors affecting internal auditors’ consideration of fraudulent financial reporting during analytical procedures. Auditing: J Pract Theory 20(1):65–80

    Article  Google Scholar 

  16. Beasley M, Carcello JV, Hermanson DR (1999) An analysis of U.S. public companies fraudulent financial reporting: 1987–1997. AICPA, New York

    Google Scholar 

  17. Glover SM (1998) The next generation software. Intern Auditor 55(4):47–52

    Google Scholar 

  18. Maulik R, Chaki N (2011) A study on wormhole attacks in MANET. Int J Comput Inf Syst Ind Manag Appl 3:271–279

    Google Scholar 

  19. Pons Ortega F (2007) Auditoría informática. Una aproximación a la mejora del control interno. Auditoría pública, revista de los órganos autonómicos de control externo 41, pp 97–100

Download references

Acknowledgements

This work has been supported by grants from the Spanish Ministry of Science and Innovation: (TIN2008-01117) and (TEC2009-13763-C02-02). By grants from Junta de Andalucía (P08-TIC-3518) and (FQM 0211), and in part financed by the European Regional Development Fund (ERDF).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. A. Álvarez-Bermejo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Álvarez-Bermejo, J.A., Antequera, N., García-Rubio, R. et al. A scalable server for key distribution and its application to accounting. J Supercomput 64, 132–143 (2013). https://doi.org/10.1007/s11227-012-0787-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-012-0787-5

Keywords

Navigation