Research on Key Management for Multi-Privileged Group Communications

被引:5
作者
Zhou, Wei [1 ,2 ]
Xu, Yang [1 ]
Wang, Guojun [1 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Hunan Agr Univ, Coll Informat Sci & Technol, Changsha 410128, Hunan, Peoples R China
来源
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1 | 2015年
基金
中国国家自然科学基金;
关键词
key management; rekeying; mult-privileged group communications; security; ACCESS-CONTROL; SCHEME;
D O I
10.1109/Trustcom.2015.369
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In some group-oriented applications, users can access several data resources according to their respective willingness. So, how to effectively access the data resources is a challenge in multi-privileged group communications. Some key management schemes for hierarchical access control are proposed. In this paper, we discuss the challenges of key management. Then, we present a list of evaluation criteria for secure key management for multi-privileged group communications, and investigate the features of some typical schemes. The schemes can be divided into several classes according to some separate dimensions, such as the topology of key model, the rekeying method, the rekeying policy and the encryption method of data resources. We analyze them comparatively regarding to the secure distribution and renewal of key materials.
引用
收藏
页码:151 / 158
页数:8
相关论文
共 30 条
  • [1] Balanced key tree management for multi-privileged groups using (N, T) policy
    Angamuthu, Muthulakshmi
    Ramalingam, Anitha
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 545 - 555
  • [2] [Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
  • [3] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [4] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [5] A Key Tree Merge Algorithm in Multi-privileged Groups
    Gu, Xiaozhuo
    Wang, Yongming
    Zhou, Weihua
    [J]. 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 288 - 294
  • [6] Reducing Rekeying Time Using an Integrated Group Key Agreement Scheme
    Gu, Xiaozhuo
    Zhao, Youjian
    Yang, Jianzu
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2012, 14 (04) : 418 - 428
  • [7] An efficient key management scheme for content access control for linear hierarchies
    Hassen, Hani Ragab
    Bettahar, Hatem
    Bouadbdallah, Abdalmadjid
    Challal, Yacine
    [J]. COMPUTER NETWORKS, 2012, 56 (08) : 2107 - 2118
  • [8] Kim Y., 2004, ACM Transactions on Information and Systems Security, V7, P60, DOI 10.1145/984334.984337
  • [9] Kim Y., 2000, ACM C COMPUTER COMMU, P235, DOI [10.1145/352600.352638, DOI 10.1145/352600.352638]
  • [10] A Tree Key Graph Design Scheme for Hierarchical Multi-Group Access Control
    Koo, Han-Seung
    Kwon, O-Hyung
    Ra, Sung-Woong
    [J]. IEEE COMMUNICATIONS LETTERS, 2009, 13 (11) : 874 - 876