An efficient key management scheme for content access control for linear hierarchies

被引:19
作者
Hassen, Hani Ragab [1 ]
Bettahar, Hatem [2 ]
Bouadbdallah, Abdalmadjid [2 ]
Challal, Yacine [2 ]
机构
[1] Univ Kent, Canterbury CT2 7NF, Kent, England
[2] UTC, F-60200 Compiegne, France
关键词
Content access control; Group communication; Key management; Linear hierarchies; Network security;
D O I
10.1016/j.comnet.2012.02.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The content access control problem appears in any context with a set of users and resources. The difference in access rights of the users defines classes, where members of a given class have exactly the same access rights. A hierarchy can be defined on the classes. Linear hierarchies constitute a particularly interesting type of hierarchies. They appear in a wide range of applications such as secure multi-layered data streaming and communications within security corps. Many proposals have dealt with key management issues for tree hierarchies but they result in unjustified overhead when applied to linear hierarchies. In this paper, we discuss the general problem of Content Access Control in a Hierarchy (CACH). Thereafter, we present the main requirements in key management to ensure confidentiality in linear hierarchies. In particular, we define a model to make a uniform and coherent description of the existing key management schemes. Thereafter, we propose an efficient key management scheme for linear hierarchies that not only provides mechanisms to manage membership changes but also hierarchy shape changes, and we describe it using our model. We conduct intensive simulations which show that our solution scales very well in terms of storage, bandwidth, and computation. Finally, we determine the complexity of some well-known key management schemes and compare them to the complexity of our scheme. This comparison shows that our scheme offers efficient compromises in complexity and overall overheads. Crown Copyright (C) 2012 Published by Elsevier B.V. All rights reserved.
引用
收藏
页码:2107 / 2118
页数:12
相关论文
共 42 条
  • [1] CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
    AKL, SG
    TAYLOR, PD
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03): : 239 - 248
  • [2] Multicast group behavior in the Internet's multicast backbone (MBone)
    Almeroth, KC
    Ammar, MH
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1997, 35 (06) : 124 - 129
  • [3] [Anonymous], P ISOC NETW DISTR SY
  • [4] Aparna R., 2009, 1 INT COMM SYST NETW, P1, DOI [10.1109/COMSNET'S.2009.4808860, DOI 10.1109/COMSNETS.2009.4808860]
  • [5] BALENSON D, 1999, KEY MANAGEM IN PRESS
  • [6] BALLARDIE A, 1996, 1949 RFC
  • [7] Becker C., 1998, COMMUNICATION COMPLE
  • [8] Boyd C, 1997, LECT NOTES COMPUT SC, V1270, P294, DOI 10.1007/BFb0027936
  • [9] BRISCOE B, 1999, P 1 INT WORKSH NETW
  • [10] Das M. L., 2005, Operating Systems Review, V39, P40, DOI 10.1145/1044552.1044556