Multi-level secure multicast: The rethinking of secure locks

被引:7
|
作者
Scheikl, O [1 ]
Lane, J [1 ]
Boyer, R [1 ]
Eltoweissy, M [1 ]
机构
[1] James Madison Univ, Dept Comp Sci, Harrisonburg, VA 22807 USA
关键词
D O I
10.1109/ICPPW.2002.1039707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a secure multicast environment, the distribution of cryptographic keys may be a primary indicator of system performance. The mathematics of public key cryptography do not scale well especially for large multi-user networks, and a symmetric-key-based system is not feasible over a network spread out geographically. The problems become even more complicated when we begin dealing with multiple levels of security, i.e. different classification levels of traffic as well as group memberships/permissions. In this paper, we present a new approach to multi-level secure multicast, one that uses the secure lock encryption scheme based on the mathematics of the Chinese Remainder Theorem to distribute keys to various subgroups. Our solution can be applied to both one-to-many and many-to-many group communications. In addition, it presents a viable solution for the distribution of one-time session keys during actual message transmission.
引用
收藏
页码:17 / 24
页数:8
相关论文
共 50 条
  • [21] Secure Data Integrity in Cloud Storage with Multi-level Hash Indexing Technique
    Kavyashree, T. P.
    Poornima, A. S.
    SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 652 - 660
  • [22] A New Blockchain-Based Multi-Level Location Secure Sharing Scheme
    Wang, Qiuhua
    Xia, Tianyu
    Ren, Yizhi
    Yuan, Lifeng
    Miao, Gongxun
    APPLIED SCIENCES-BASEL, 2021, 11 (05): : 1 - 22
  • [23] Secure multi-level permutation operation based multiple colour image encryption
    Patro, K. Abhimanyu Kumar
    Acharya, Bibhudendra
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 111 - 133
  • [24] Multi-level security-based optimal designs for secure game communications
    Jagadeesan, D.
    Jegan, J.
    Subramanian, S. Siva
    Kartheesan, L.
    Deepa, D.
    Asha, G.
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2024,
  • [25] Modeling a multi-level secure object-oriented database using views
    Baraani-Dastjerdi, A
    Pieprzyk, J
    Safavi-Naini, R
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 190 - 206
  • [26] Individually-Secure Multi-Source Multicast
    Cohen, Alejandro
    Cohen, Asaf
    Medard, Muriel
    Gurewitz, Omer
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017,
  • [27] High Performance Locks for Multi-level NUMA Systems
    Chabbi, Milind
    Fagan, Michael
    Mellor-Crummey, John
    ACM SIGPLAN NOTICES, 2015, 50 (08) : 215 - 226
  • [28] Multi-level locks to control collaborative modeling sessions
    Pichiliani, Mauro C.
    Hirata, Celso M.
    2007 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2008, : 303 - 307
  • [29] Efficient key management scheme for secure application level multicast
    Bettahar, Hatem
    Alkubeily, Mothanna
    Bouabdallah, Abdelmadjid
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 430 - 435
  • [30] Infrastructure for Multi-Level Secure Service-Oriented Architecture (MLS-SOA)
    Luo, Jim
    Kang, Myong
    MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 475 - 481