Skip to main content

Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9532))

  • 1754 Accesses

Abstract

In multi-privileged group communications, the group users have different access privileges to multiple data resources. The influence on the system is different between the users when membership changes in the group. In batch rekeying, when the keys are not updated promptly, the more access privileges the users change, the more related resources are exposed to the malicious users. Unfortunately, in those existing batch rekeying schemes, the group users are treated equally. So in this paper, we propose a weight-based batch rekeying scheme for multi-privileged group communications to decrease the exposure of data resources in a batch. A weight is assigned for each membership change of the users. Then, rekeying is performed in batch when the sum of collected weights is larger than a predetermined threshold. In the operation of batch rekeying, a marking algorithm is devised to process a batch of joining/leaving/switching requests, and the related keys are updated according to the corresponding marks. We give some analysis on our scheme to show that our scheme can provide hierarchical access control, as well as backward security and weak forward security. It also shows that our scheme can save server cost substantially. At last, extensive simulation results show our scheme can improve the security to a certain extent.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Comput. Surv. 35(3), 309–329 (2003)

    Article  Google Scholar 

  2. Sun, Y., Liu, K.J.R.: Scalable hierarchical access control in secure group communications. In: IEEE INFOCOM 2004, vol. 2, pp. 1296–1306. IEEE Press, Hong Kong (2004)

    Google Scholar 

  3. Li, X.S., Yang, Y.R., Gouda, M.G., Lam, S.S.: Batch rekeying for secure group communications. In: The 10th International Conference on World Wide Web, pp. 525–534, Hong Kong (2001). doi:10.1145/371920.372153

  4. Wang, G., Ouyang, J., Chen, H., Guo, M.: Efficient group key management for multi-privileged groups. Comput. Commun. 30(11–12), 2497–2509 (2007)

    Article  Google Scholar 

  5. Pegueroles, J., Rico-Novella, F.: Balanced batch LKH: new proposal, implementation and performance evaluation. In: 2003 IEEE Symposium on Computers and Communications (ISCC), pp. 815–828. IEEE Press, Turkey (2003). doi:10.1109/ISCC.2003.1214218

  6. Gu, X., Wang, Y., Zhou, W.: A key tree merge algorithm in multi-privileged groups. In: 2013 IEEE 16th International Conference on Computational Science and Engineering, pp. 288–294. IEEE Press, Sydney, Australia 3–5 December 2013

    Google Scholar 

  7. Ng, W.H.D., Cruickshank, H., Sun, Z.: Scalable balanced batch rekeying for secure group communication. Comput. Secur. 25(4), 265–273 (2006)

    Article  Google Scholar 

  8. Veltri, L., Cirani, S., Ferrari, G.: A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Netw. 11(8), 2724–2737 (2013)

    Article  Google Scholar 

  9. Li, G., Li, B., Du, T., Pan, J., Li, Y.: Batch rekeying model based on queuing theory in secure group communications. In: 2010 IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 247–250. IEEE Press, Beijing, China. doi:10.1109/ICITIS.2010.5689453

  10. Cho, J., Chen, I., Eltoweissy, M.: On optimal batch rekeying for secure group communications in wireless networks. Wireless Netw. 14, 915–927 (2008). doi:10.1007/s11276-007-0032-y

    Article  Google Scholar 

  11. Muthulakshmi, A., Anitha, R.: Balanced key tree management for multi-privileged groups using (N, T) policy. Secur. Commun. Netw. 5(5), 545–555 (2012)

    Article  Google Scholar 

  12. Xu, Y., Zhou, W., Wang, G.: Multiway tree-based group key management using Chinese remainder theorem for multi-privileged group communications. J. Appl. Sci. Eng. 17(1), 81–92 (2014)

    Google Scholar 

  13. Je, D., Lee, J., Park, Y., Seo, S.: Computation-and-storage-efficient key tree management protocol for secure multicast communications. Comput. Commun. 33, 136–148 (2010)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China under grant numbers 61272151 and 61472451, the Youth Science Foundation of Hunan Agricultural University in China under grant number 14QN15, and the Central South University - Tencent Joint Project and the Hunan Provincial Innovation Foundation for Postgraduate under grant numbers CX2015B047.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhou, W., Xu, Y., Yang, L., Wang, G. (2015). Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27161-3_62

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27160-6

  • Online ISBN: 978-3-319-27161-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics