Abstract
We introduce a hierarchical approach for secure multicast where rekeying of groups of users is made through a method based on Euclid’s algorithm for computing GCD. We consider tree arrangements of users that decrease requirements on bandwidth as protocols of the same nature, but also show that computational requirements are less than in other similar approaches. We also introduce a distributed protocol by groups with group managers that not only helps to decrease size of rekeying messages with respect to a centralized approach, but also to increase the security level concerning authentication of users and distributed information.





We’re sorry, something doesn't seem to be working properly.
Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.
References
Antequera N, Lopez-Ramos JA (2011) Remarks and countermeasures on a cryptanalysis of a secure multicast protocol. In: Proceedings of 7th international conference on next generation web services practices, Salamanca 2011, Salamanca (Spain), pp 201–205
Antequera N, Garcia-Rubio R, Lopez-Ramos JA (2013) Secure auditing and e-commerce. Int J Comput Inf Syst Ind Manag Appl 5:581–588. ISSN 2150-7988
Bierstaker JL, Burnaby P, Thibodeau J (2001) The impact of information technology on the audit process: an assessment of the state of the art and implications for the future. Manag Audit J 16(3):159–164
Chan K-C, Chan S-HG (2003) Key management approaches to offer data confidentiality for secure multicast. IEEE Netw 17(5):30–39
Chiou G, Chen W (1989) Secure broadcasting using the secure lock. IEEE Trans Softw Eng 15(8):929–934
Dalci I, Tanis VN (2002) Benefits of computerized accounting information systems on the JIT production systems. Rev Soc Econ Bus Stud 2:45–64
Di Pietro R, Mancini LV, Jajodia S (2002) Efficient and secure keys management for wireless mobile communications. In: Proceedings of POMC 2002, pp 66–73
Glover S, Romney M (1998) The next generation software. Intern Aud 55(4):47–53
Janakova M (2011) Database technology analysis for the support or instant information retrieval. Int J Comput Inf Syst Ind Manag Appl 3:586–593
Kale LV, Zheng G (2009) Charm++ and AMPI: adaptive runtime strategies via migratable objects. In: Advanced computational infrastructures for parallel and distributed applications. Wiley-Interscience, New York
Kruus PS, Macker JP (1998) Techniques and issues in multicast security. In: Proceedings of military communications conference, MILCOM, pp 1028–1032
Liu B, Zhang W, Jiang T (2004) A scalable key distribution scheme for conditional access system in digital pay-TV system. IEEE Trans Consum Electron 50(2):632–637
Maulik R, Chaki N (2011) A study on wormhole attacks in MANET. Int J Comput Inf Syst Ind Manag Appl 3:271–279
Mittra S (1997) Iolus: a framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM, New York, Sept. ACM, New York, pp 277–288. 27(4)
Naranjo JAM, Antequera N, Casado LG, Lopez-Ramos JA (2012) A suite of algorithms for key distribution and authentication in centralized secure multicast environments. J Comput Appl Math. doi:10.1016/j.cam.2011.02.015
Peinado A, Ortiz A (2011) Cryptanalysis of multicast protocols with key refreshment based on the extended Euclidean algorithm. In: Proceedings of CISIS 2011. Lecture notes in computer sciences, vol 6694, pp 177–182
Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309–329
Scheikl O, Lane J, Boyer R, Eltoweissy M (2002) Multi-level secure multicast: the rethinking of secure locks. In: International conference on parallel processing workshops, 2002, proceedings, pp 17–24
Sherman AT, McGrew DA (2003) Key establishment in large dynamic groups using one-way function trees. IEEE Trans Softw Eng 29:444–458
Ukil A (2011) Context protecting privacy preservation in ubiquitous computing. Int J Comput Inf Syst Ind Manag Appl 3:228–235
Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B (1999) The VersaKey framework: versatile group key management. IEEE J Sel Areas Commun 17(9):1614–1631
Wallner D, Harder E, Agee R (1999) Key management for multicast: issues and architectures. RFC 2627
Zhu S, Jajodia S (2010) Scalable group key management for secure multicast: a taxonomy and new directions. In: Huang H, MacCallum D, Du D-Z (eds) Network security. Springer, New York, pp 57–75
Acknowledgements
This work has been supported by the Spanish Ministry of Science and Innovation (TEC2009-13763-C02-02, TIN2008-01117) and Junta de Andalucía (FQM 0211, P08-TIC-3518 and P11-TIC7176).
Author information
Authors and Affiliations
Corresponding author
About this article
Cite this article
Álvarez-Bermejo, J.A., Antequera, N. & López-Ramos, J.A. Hierarchical approaches for multicast based on Euclid’s algorithm. J Supercomput 65, 1164–1178 (2013). https://doi.org/10.1007/s11227-013-0923-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-013-0923-x