Abstract
Group key agreement is a fundamental building block for secure peer group communication systems. Several group key management techniques were proposed in the last decade, all assuming the existence of an underlying group communication infrastructure to provide reliable and ordered message delivery as well as group membership information. Despite analysis, implementation, and deployment of some of these techniques, the actual costs associated with group key management have been poorly understood so far. This resulted in an undesirable tendency: on the one hand, adopting suboptimal security for reliable group communication, while, on the other hand, constructing excessively costly group key management protocols.This paper presents a thorough performance evaluation of five notable distributed key management techniques (for collaborative peer groups) integrated with a reliable group communication system. An in-depth comparison and analysis of the five techniques is presented based on experimental results obtained in actual local- and wide-area networks. The extensive performance measurement experiments conducted for all methods offer insights into their scalability and practicality. Furthermore, our analysis of the experimental results highlights several observations that are not obvious from the theoretical analysis.
- Amir, Y., Danilov, C., Miskin-Amir, M., Schultz, J., and Stanton, J. 2004. The Spread Toolkit: Architecture and Performance. Tech. rep., CNDS-2004-1, Johns Hopkins University.]]Google Scholar
- Amir, Y., Dolev, D., Kramer, S., and Malki, D. 1992. Transis: A communication sub-system for high availability. In Digest of Papers, The 22nd International Symposium on Fault-Tolerant Computing Systems. 76--84.]]Google Scholar
- Amir, Y., Kim, Y., Nita-Rotaru, C., Schultz, J., Stanton, J., and Tsudik, G. 2001. Exploring robustness in group key agreement. In The 21st IEEE International Conference on Distributed Computing Systems. IEEE Computer Society Press, 399--408.]] Google Scholar
- Amir, Y., Kim, Y., Nita-Rotaru, C., Schultz, J., Stanton, J., and Tsudik, G. 2004. Secure group communication using robust contributory key agreement. IEEE Trans. Parallel and Distrib. Syst. 15, 5, 468--480.]] Google Scholar
- Amir, Y., Kim, Y., Nita-Rotaru, C., and Tsudik, G. 2002. On the performance of group key agreement protocols (short paper). In The 22nd IEEE International Conference on Distributed Computing Systems. IEEE Computer Society Press.]] Google Scholar
- Amir, Y., Moser, L. E., Melliar-Smith, P. M., Agarwal, D., and Ciarfella, P. 1995. The Totem single-ring ordering and membership protocol. ACM Trans. Comput. Syst. 13, 4 (Nov.), 311--342.]] Google Scholar
- Amir, Y., Nita-Rotaru, C., Stanton, J., and Tsudik, G. 2003. Scaling secure group communication systems: Beyond peer-to-peer. In The 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), Washington, D.C.]]Google Scholar
- Amir, Y. and Stanton, J. 1998. The Spread wide area group communication system. Tech. rep., 98-4, Johns Hopkins University.]]Google Scholar
- Anker, T., Chockler, G. V., Dolev, D., and Keidar, I. 1998. Scalable group membership services for novel applications. In Workshop on Networks in Distributed Computing.]]Google Scholar
- Birman, K. P. and Joseph, T. 1987. Exploiting virtual synchrony in distributed systems. In The 11th Annual Symposium on Operating Systems Principles. 123--138.]] Google Scholar
- Birman, K. P. and Renesse, R. V. 1994. Reliable Distributed Computing with the ISIS Toolkit. IEEE Computer Society Press.]] Google Scholar
- Boneh, D. 1998. The decision Diffie-Hellman problem. In Third Algorithmic Number Theory Symposium. Lecture Notes in Computer Science, vol. 1423. Springer-Verlag, Berlin Germany, 48--63.]] Google Scholar
- Boneh, D. 1999. Twenty years of attacks on the RSA cryptosystem. Not. Am. Math. Soc. (AMS) 46, 2, 203--213.]]Google Scholar
- Bresson, E., Chevassut, O., and Pointcheval, D. 2001a. Provably authenticated group Diffie-Hellman key exchange---The dynamic case. In Asiacrypt 2001. Lecture Notes in Computer Science.]] Google Scholar
- Bresson, E., Chevassut, O., Pointcheval, D., and Quisquater, J.-J. 2001b. Provably authenticated group Diffie-Hellman key exchange. In The 8th ACM Conference on Computer and Communications Security. ACM Press.]] Google Scholar
- Burmester, M. and Desmedt, Y. 1994. A secure and efficient conference key distribution system. Advances in Cryptology---EUROCRYPT'94.]]Google Scholar
- Caronni, G., Waldvogel, M., Sun, D., Weiler, N., and Plattner, B. 1999. The VersaKey framework: Versatile group key management. IEEE J. Select. Areas Commun. 17, 9 (Sep.).]] Google Scholar
- Diffie, W. and Hellman, M. E. 1976. New directions in cryptography. IEEE Trans. Inform. Theory IT-22, 644--654.]]Google Scholar
- Fekete, A., Lynch, N., and Shvartsman, A. 1997. Specifying and using a partitionable group communication service. In The 16th ACM Symposium on Principles of Distributed Computing, Santa Barbara, CA. 53--62.]] Google Scholar
- Floyd, S., Jacobson, V., Liu, C., McCanne, S., and Zhang, L. 1997. A reliable multicast framework for light-weight sessions and application level framing. IEEE/ACM Trans. Netw. 5, 6 (Dec.), 784--803.]] Google Scholar
- Gong, L. 1997. Enclaves: Enabling secure collaboration over the Internet. IEEE J. Select. Areas Commun. 15, 3 (Apr.), 567--575.]] Google Scholar
- Harney, H., Colegrove, A., and McDaniel, P. 2001. Principles of policy in secure groups. In Network and Distributed Systems Security Symposium.]]Google Scholar
- Hiltunen, M. A. and Schlichting, R. D. 1996. Adaptive distributed and fault-tolerant systems. Int. J. Comput. Syst. Sci. Engng. 11, 5 (Sep.), 125--133.]]Google Scholar
- Hiltunen, M. A., Schlichting, R. D., and Ugarte, C. 2001. Enhancing survivability of security services using redundancy. In International Conference on Dependable Systems and Networks.]] Google Scholar
- Katz, J. and Yung, M. 2003. Scalable protocols for authenticated group key exchange. Advances in Cryptology---CRYPTO'03.]]Google Scholar
- Keidar, I., Marzullo, K., Sussman, J., and Dolev, D. 2000. A client-server oriented algorithm for virtually synchronous group membership in WANs. In The 20th International Conference on Distributed Computing Systems. 356--365.]] Google Scholar
- Kihlstrom, K. P., Moser, L. E., and Melliar-Smith, P. M. 1998. The SecureRing protocols for securing group communication. In The 31st Hawaii International Conference on System Sciences, Vol. 3. Kona, Hawaii, 317--326.]] Google Scholar
- Kim, Y. 2002. Group Key Agreement---Theory and Practice. Ph.D. thesis, Department of Computer Science, University of Southern California.]] Google Scholar
- Kim, Y., Perrig, A., and Tsudik, G. 2000. Simple and fault-tolerant key agreement for dynamic collaborative groups. In The 7th ACM Conference on Computer and Communications Security. ACM Press, 235--244.]] Google Scholar
- Kim, Y., Perrig, A., and Tsudik, G. 2001. Communication-efficient group key agreement. In IFIP SEC 2001.]] Google Scholar
- Kim, Y., Perrig, A., and Tsudik, G. 2004a. Group key agreement efficient in communication. IEEE Trans. Comput. 33, 7.]] Google Scholar
- Kim, Y., Perrig, A., and Tsudik, G. 2004b. Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7, 1.]] Google Scholar
- McDaniel, P., Prakash, A., and Honeyman, P. 1999. Antigone: A flexible framework for secure group communication. In The 8th USENIX Security Symposium. 99--114.]] Google Scholar
- Menezes, A., van Oorschot, P., and Vanstone, S. 1996. Handbook of Applied Cryptography. CRC Press.]] Google Scholar
- Moser, L. E., Amir, Y., Melliar-Smith, P. M., and Agarwal, D. A. 1994. Extended virtual synchrony. In The 14th International Conference on Distributed Computing Systems. IEEE Computer Society Press, Los Alamitos, CA, 56--65.]]Google Scholar
- National Institute for Standards and Technology (NIST). 2000. Digital Signature Standard (DSS). Number FIPS 186-2. National Institute for Standards and Technology (NIST). http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf.]]Google Scholar
- Nita-Rotaru, C. 2003. High Performance Secure Group Communication. Ph.D. thesis, Department of Computer Science, Johns Hopkins University.]] Google Scholar
- OpenSSL Project team. 1999. OpenSSL. http://www.OpenSSL.org/.]]Google Scholar
- Reiter, M. K. 1994. Secure agreement protocols: reliable and atomic group multicast in RAMPART. In The 2nd ACM Conference on Computer and Communications Security. 68--80.]] Google Scholar
- Renesse, R. V., Birman, K., and Maffeis, S. 1996. Horus: A flexible group communication system. Commun. ACM 39, 76--83.]] Google Scholar
- Rivest, R. L., Shamir, A., and Adleman, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb.), 120--126.]] Google Scholar
- Rodeh, O., Birman, K., and Dolev, D. 2001. The architecture and performance of security protocols in the Ensemble Group Communication System. ACM Trans. Inf. Syst. Secur. 4, 3 (Aug.), 289--319.]] Google Scholar
- Rodeh, O., Birman, K., and Dolev, D. 2002. Using AVL trees for fault tolerant group key management. Int. J. Inf. Secur. 1, 2 (Feb.).]]Google Scholar
- Schultz, J. 2001. Partitionable Virtual Synchrony using Extended Virtual Synchrony. M.S. thesis, Department of Computer Science, Johns Hopkins University.]]Google Scholar
- Setia, S., Koussih, S., Jajodia, S., and Harder, E. 2000. Kronos: A scalable group re-keying approach for secure multicast. In The 2000 IEEE Symposium on Security and Privacy. IEEE, 215--218. Oakland, CA.]] Google Scholar
- Sherman, A. T. and McGrew, D. A. 2003. Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Engng. 444--458.]] Google Scholar
- Steer, D., Strawczynski, L., Diffie, W., and Wiener, M. 1990. A secure audio teleconference system. Advances in Cryptology---CRYPTO'88.]] Google Scholar
- Steiner, M., Tsudik, G., and Waidner, M. 2000. Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst..]] Google Scholar
- Tzeng, W.-G. and Tzeng, Z.-J. 2000. Round-efficient conference-key agreement protocols with provable security. In Advances in Cryptology---ASIACRYPT '2000. Lecture Notes in Computer Science. Springer-Verlag, Kyoto, Japan.]] Google Scholar
- Wallner, D., Harder, E., and Agee, R. 1999. Key management for multicast: Issues and architectures. RFC 2627.]] Google Scholar
- Whetten, B., Montgomery, T., and Kaplan, S. 1994. A high performance totally ordered multicast protocol. In Theory and Practice in Distributed Systems, International Workshop. Lecture Notes in Computer Science, vol. 938.]] Google Scholar
- Wong, C. K., Gouda, M. G., and Lam, S. S. 2000. Secure group communications using key graphs. Trans. Netw. 8, 1, 16--30.]] Google Scholar
Index Terms
- On the performance of group key agreement protocols
Recommendations
Ordered Delivery of Messages in Group Communication Protocols
NBIS '12: Proceedings of the 2012 15th International Conference on Network-Based Information SystemsIn peer-to-peer (P2P) overlay networks, a group of multiple peers have to cooperate with each other. P2P systems are in nature scalable, distributed systems, where there is no centralized coordinator. Hence, a group of peers is required to be scalable ...
Experimentation of Group Communication Protocols
NBIS '13: Proceedings of the 2013 16th International Conference on Network-Based Information SystemsIn peer-to-peer (P2P) overlay networks, a group of n (= 2) peer processes have to cooperate with each other. Each peer directly sends messages to every peer and receives messages from every peer in a group. In group communications, each message sent by ...
Group Communication Protocols for Scalable Groups of Peers
WAINA '13: Proceedings of the 2013 27th International Conference on Advanced Information Networking and Applications WorkshopsIn peer-to-peer (P2P) overlay networks, a group of $n$ ($\geq 2$) peer processes have to cooperate with each other. P2P systems are in nature scalable and distributed, where there is no centralized coordinator. Each peer sends messages to every peer and ...
Comments