Geographic server distribution model for key revocation

被引:6
|
作者
Misra, Sudip [2 ]
Goswami, Sumit [3 ]
Pathak, Gyan Prakash [3 ]
Shah, Nirav [3 ]
Woungang, Isaac [1 ]
机构
[1] Ryerson Univ, Dept Comp Sci, Toronto, ON M5B 2K3, Canada
[2] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[3] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
Geographic server distribution; Key revocation; Public key infrastructure; Certifying authority; Strongest availability zone; CERTIFICATE REVOCATION; ENCRYPTION;
D O I
10.1007/s11235-009-9254-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Key management is one of the important issues in ensuring the security of network services. The aim of key management is to ensure availability of the keys at both the receiver's and the sender's ends. Key management involves two aspects: key distribution and key revocation. Key distribution involves the distribution of keys to various nodes with secrecy to provide authenticity and privacy. Key revocation involves securely and efficiently managing the information about the keys which have been compromised. This paper presents the geographic server distributed model for key revocation which concerns about the security and performance of the system. The concept presented in this paper is more reliable, faster and scalable than the existing Public Key Infrastructure (PKI) framework in various countries, as it provides optimization of key authentication in a network. It proposes auto-seeking of a geographically distributed certifying authority's key revocation server, which holds the revocation lists by the client, based on the best service availability. The network is divided itself into the strongest availability zones (SAZ), which automatically allows the new receiver to update the address of the authentication server and replace the old address with the new address of the SAZ, in case it moves to another location in the zone, or in case the server becomes unavailable in the same zone. In this way, it reduces the time to gain information about the revocation list and ensures availability and, thus, improvement of the system as a whole. Hence, the proposed system results in scalable, reliable and faster PKI infrastructure and will be attractive for the users who frequently change their location in the network. Our scheme eases out the revocation mechanism and enables key revocation in the legacy systems. It discusses the architecture as well as the performance of our scheme as compared to the existing scheme. However, our scheme does not call for the entire change in PKI, but is compatible with the existing scheme. Our simulations show that the proposed scheme is better for key revocation.
引用
收藏
页码:281 / 295
页数:15
相关论文
共 50 条
  • [1] Geographic server distribution model for key revocation
    Sudip Misra
    Sumit Goswami
    Gyan Prakash Pathak
    Nirav Shah
    Isaac Woungang
    Telecommunication Systems, 2010, 44 : 281 - 295
  • [2] CAS Key Distribution Model with Revocation
    Kim, DaeYoub
    Lee, Jihoon
    Huh, Misuk
    2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [3] Efficient broadcast key distribution with dynamic revocation
    Batten, Lynn
    Yi, Xun
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (04) : 351 - 362
  • [4] Self-healing key distribution with revocation
    Staddon, J
    Miner, S
    Franklin, M
    Balfanz, D
    Malkin, M
    Dean, D
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 241 - 257
  • [5] A Model for Distribution and Revocation of Certificates
    Hagstroem, Asa
    Parisi-Presicce, Francesco
    GRAPH TRANSFORMATIONS, 2010, 6372 : 314 - 329
  • [6] A quick group key distribution scheme with "entity revocation"
    Anzai, J
    Matsuzaki, N
    Matsumoto, T
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 333 - 347
  • [7] On the Optimization of Key Revocation Schemes for Network Telemetry Data Distribution
    Gopularam, Bhanu Prakash
    Nalini, N.
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 536 - 540
  • [8] A model for revocation forecasting in public-key infrastructures
    Carlos Gañán
    Jorge Mata-Díaz
    Jose L. Muñoz
    Oscar Esparza
    Juanjo Alins
    Knowledge and Information Systems, 2015, 43 : 311 - 331
  • [9] A new centralized group key distribution and revocation in sensor network
    Gerelbayar, Tegshbayar
    Park, Jong Sou
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 721 - 724
  • [10] A model for revocation forecasting in public-key infrastructures
    Ganan, Carlos
    Mata-Diaz, Jorge
    Munoz, Jose L.
    Esparza, Oscar
    Alins, Juanjo
    KNOWLEDGE AND INFORMATION SYSTEMS, 2015, 43 (02) : 311 - 331