Advertisement

Steganography-Based Secure Communication

  • Manjot Bhatia
  • Sunil Kumar Muttoo
  • M. P. S. Bhatia
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 236)

Abstract

Security and scalability are important issues for secure group communication in a grid environment. Secure communication involves confidentiality and authenticity of the user and the message between group members. To transmit data in a secure way, a secure and authenticated key transfer protocol should be applied. Key transfer protocol needs an entity responsible for user authentication and secures session keys. Recently, many researchers have proposed secure group communication methods based upon various cryptographic techniques. In this paper, we propose a secure key transfer protocol that uses the concepts of soft dipole representation of the image and steganography to establish secure communication between group of authenticated users. Steganography hides the existence of group keys in images. This protocol is more secure as compare to previously proposed encryption based group communication protocols. This protocol uses a centralized entity key management center (KMC). KMC generates the group key using soft dipoles of the images of the group members and broadcast it securely to all the communicating group members.

Keywords

Grid security Key management protocol Secure group communication Soft dipole representation Communication security 

References

  1. 1.
    Aparna, R., Amberker, B.B.: Dynamic authenticated secure group communication. World Acad. Sci. Eng. Technol. 34 (2007)Google Scholar
  2. 2.
    Bhatia, M., Mutto, S.K., Bhatia, M.P.S.: Secure group communication protocol. Int. J. Adv. Eng. Sci. Technol. (2011)Google Scholar
  3. 3.
    Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: Proceedings of Eurocrypt ’94 Workshop Advances in Cryptology, pp. 275–286 (1994)Google Scholar
  4. 4.
    Chadramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. IEEE (2001)Google Scholar
  5. 5.
    Chubb, C., Yellott, J.I.: Dipole statistics of discrete finite images: two visually motivated representation theorems. J. Opt. Soc. Am. A (2002)Google Scholar
  6. 6.
    Cody, E., Sharman, R., Rao, R.H., Upadhyaya, S., et al.: Security in grid computing: a review and synthesis. Decis. Supp. Syst. 44(4), 749–764 (2008)Google Scholar
  7. 7.
    Foster, I., et al.: Grid services for distributed systems integration. IEEE Comput. Soc. 35(6), 37–46 (2002)Google Scholar
  8. 8.
    Foster, I., et al.: In the Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)Google Scholar
  9. 9.
    Foster, I., et al.: The anatomy of the grid: enabling scalable virtual organizations. Int. J. High Perform. Comput. Appl. ACM Digital Library, pp. 200–222 (2001)Google Scholar
  10. 10.
    Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proceedings of ACM Conference on Computers and Security (1998)Google Scholar
  11. 11.
    Harney, H., Muckenhirn, C., Rivers, T.: Group Key Management Protocol (GKMP), Architecture RFC2094 (1997)Google Scholar
  12. 12.
    Ingle, R., Sivakumar, G.: EGSI: TGKA based security architecture for group communication in grid. In: Proceedings of the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, May 17–20, IEEE Computer Society, Australia, pp. 34–42 (2010). doi: 10.1109/CCGRID.2010.28
  13. 13.
    Johnson, N. F., Katzenbeisser Stefan, C.: A Survey of Steganographic Techniques. Artech House Books, London (2000)Google Scholar
  14. 14.
    Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganogarphy and Digital Watermarking. Artech House, London (2000)Google Scholar
  15. 15.
    Li, Y., Jin, H., Zou, D., Liu, S., Han, Z.: A scalable service scheme for secure group communication in grid. In: 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), pp. 31–38 (2007)Google Scholar
  16. 16.
    Li, Y., Xu, X., Wan, J., Jin, H., Han, Z.: An authenticated encryption mechanism for secure group communication in grid. In: Proceedings of the International Conference on Internet Computing in Science and Engineering, Jan. 28–29, USA, pp. 298–305 (2008). doi: 10.1109/ICICSE.2008.80
  17. 17.
    Li, Y., Jin, H., Han, Z., Liu, S., et al.: A secure mechanism of group communication for pervasive grid. Int. J. Ad Hoc Ubiquitous Comput. 4, 344–353 (2009). doi: 10.1504/IJAHUC.2009.028662 CrossRefGoogle Scholar
  18. 18.
    Park, H., Yi, W.S., Lee, G.: Simple ID-based key distribution scheme. In: Fifth International Conference on Internet and Web Applications and Services 2010, 369–373 (2010)Google Scholar
  19. 19.
    Steganographic techniques, a brief survey. Department of computer science, Wellesley CollegeGoogle Scholar
  20. 20.
    Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: Proceedings of Third ACM Conference on Computer and Communication Security (CCS ’96), pp. 31–37 (1996)Google Scholar
  21. 21.
    Sudha, S., Samsudin, A., Alia, M.A.: Group rekeying protocol based on modular polynomial arithmetic over Galois field GF (2n). Am. J. Appl. Sci. 6, 1714–1717 (2009). doi: 10.3844/ajassp.2009.1714.1717 CrossRefGoogle Scholar
  22. 22.
    Valli, V., Kumari, D., NagaRaju, V., Soumy, K., Raju, K.V.S.V.N.: Secure group key distribution using hybrid cryptosystem. In: Proceedings of the 2nd International Conference on Machine Learning and Computing, IEEE Computer Society, Washington, pp. 188–192 (2010). doi: 10.1109/ICMLC.2010.4110
  23. 23.
    Wikipedia, Digital Image processing, available at: http://en.wikipedia.org/wiki/Digital_image_processing, accessed on March 2012
  24. 24.
    Xu, S.: On the Security of Group Communication SchemesGoogle Scholar
  25. 25.
    Zhenga, Y., Wanga, H.Y., Wang, R., et al.: Grid authentication from identity-based cryptography without random oracles. J. China Univ. Posts Telecommun., Elsevier 15(4), 55–59 (2008)CrossRefGoogle Scholar
  26. 26.
    Zoua X., Dai Y.S., Rana X.: Dual-level key management for secure grid communication in dynamic and hierarchical groups. Future Gen. Comput. Syst., Science Direct, 23(6), 776–78 (2007)Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  • Manjot Bhatia
    • 1
  • Sunil Kumar Muttoo
    • 1
  • M. P. S. Bhatia
    • 2
  1. 1.Department of Computer ScienceUniversity of DelhiNew DelhiIndia
  2. 2.Department of Computer EngineeringNetaji Subhas Institute of TechnologyNew DelhiIndia

Personalised recommendations