Geographic server distribution model for key revocation

被引:6
|
作者
Misra, Sudip [2 ]
Goswami, Sumit [3 ]
Pathak, Gyan Prakash [3 ]
Shah, Nirav [3 ]
Woungang, Isaac [1 ]
机构
[1] Ryerson Univ, Dept Comp Sci, Toronto, ON M5B 2K3, Canada
[2] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[3] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
Geographic server distribution; Key revocation; Public key infrastructure; Certifying authority; Strongest availability zone; CERTIFICATE REVOCATION; ENCRYPTION;
D O I
10.1007/s11235-009-9254-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Key management is one of the important issues in ensuring the security of network services. The aim of key management is to ensure availability of the keys at both the receiver's and the sender's ends. Key management involves two aspects: key distribution and key revocation. Key distribution involves the distribution of keys to various nodes with secrecy to provide authenticity and privacy. Key revocation involves securely and efficiently managing the information about the keys which have been compromised. This paper presents the geographic server distributed model for key revocation which concerns about the security and performance of the system. The concept presented in this paper is more reliable, faster and scalable than the existing Public Key Infrastructure (PKI) framework in various countries, as it provides optimization of key authentication in a network. It proposes auto-seeking of a geographically distributed certifying authority's key revocation server, which holds the revocation lists by the client, based on the best service availability. The network is divided itself into the strongest availability zones (SAZ), which automatically allows the new receiver to update the address of the authentication server and replace the old address with the new address of the SAZ, in case it moves to another location in the zone, or in case the server becomes unavailable in the same zone. In this way, it reduces the time to gain information about the revocation list and ensures availability and, thus, improvement of the system as a whole. Hence, the proposed system results in scalable, reliable and faster PKI infrastructure and will be attractive for the users who frequently change their location in the network. Our scheme eases out the revocation mechanism and enables key revocation in the legacy systems. It discusses the architecture as well as the performance of our scheme as compared to the existing scheme. However, our scheme does not call for the entire change in PKI, but is compatible with the existing scheme. Our simulations show that the proposed scheme is better for key revocation.
引用
收藏
页码:281 / 295
页数:15
相关论文
共 50 条
  • [31] Implementing State Distribution Model in Asterisk Server
    Montazerolghaem, Ahmadreza
    Moghaddam, Mohammad Hossien Yaghmaee
    Effati, Sohrab
    2014 7TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2014, : 608 - 612
  • [32] A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks
    Du, Wei
    He, Mingxing
    Li, Xiao
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2009, 5574 : 832 - 843
  • [33] A Conditional Access System with Efficient Key Distribution and Revocation for Mobile Pay-TV Systems
    Yeh, Lo-Yao
    Huang, Jiun-Long
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2013, 9 (03)
  • [34] Computationally secure self-healing key distribution with revocation in wireless ad hoc networks
    Dutta, Ratna
    Mukhopadhyay, Sourav
    Collier, Martin
    AD HOC NETWORKS, 2010, 8 (06) : 597 - 613
  • [35] Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks
    Du, Wei
    He, Mingxing
    PROVABLE SECURITY, 2008, 5324 : 345 - 359
  • [36] Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network
    Xu, Qingyu
    He, Mingxing
    INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 41 - 55
  • [37] On a model of the quantum key distribution
    Volovich, IV
    Trushechkin, AS
    DOKLADY MATHEMATICS, 2005, 72 (02) : 795 - 797
  • [38] Key revocation scheme for mobile sensor networks
    Kim, Dong Seong
    Sadi, Mohammed Golam
    Park, Jong Sou
    FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2007 WORKSHOPS, 2007, 4743 : 41 - +
  • [39] Secure key-updating for lazy revocation
    Backes, Michael
    Cachin, Christian
    Oprea, Alina
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 327 - 346
  • [40] Markov Model for Tweets Geographic Distribution Characterization
    Stoica, Eduard Alexandru
    Pitic, Antoniu Gabriel
    Cristescu, Marian Pompiliu
    22ND INTERNATIONAL ECONOMIC CONFERENCE OF SIBIU 2015, IECS 2015 ECONOMIC PROSPECTS IN THE CONTEXT OF GROWING GLOBAL AND REGIONAL INTERDEPENDENCIES, 2015, 27 : 636 - 645