Geographic server distribution model for key revocation

被引:6
|
作者
Misra, Sudip [2 ]
Goswami, Sumit [3 ]
Pathak, Gyan Prakash [3 ]
Shah, Nirav [3 ]
Woungang, Isaac [1 ]
机构
[1] Ryerson Univ, Dept Comp Sci, Toronto, ON M5B 2K3, Canada
[2] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[3] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
Geographic server distribution; Key revocation; Public key infrastructure; Certifying authority; Strongest availability zone; CERTIFICATE REVOCATION; ENCRYPTION;
D O I
10.1007/s11235-009-9254-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Key management is one of the important issues in ensuring the security of network services. The aim of key management is to ensure availability of the keys at both the receiver's and the sender's ends. Key management involves two aspects: key distribution and key revocation. Key distribution involves the distribution of keys to various nodes with secrecy to provide authenticity and privacy. Key revocation involves securely and efficiently managing the information about the keys which have been compromised. This paper presents the geographic server distributed model for key revocation which concerns about the security and performance of the system. The concept presented in this paper is more reliable, faster and scalable than the existing Public Key Infrastructure (PKI) framework in various countries, as it provides optimization of key authentication in a network. It proposes auto-seeking of a geographically distributed certifying authority's key revocation server, which holds the revocation lists by the client, based on the best service availability. The network is divided itself into the strongest availability zones (SAZ), which automatically allows the new receiver to update the address of the authentication server and replace the old address with the new address of the SAZ, in case it moves to another location in the zone, or in case the server becomes unavailable in the same zone. In this way, it reduces the time to gain information about the revocation list and ensures availability and, thus, improvement of the system as a whole. Hence, the proposed system results in scalable, reliable and faster PKI infrastructure and will be attractive for the users who frequently change their location in the network. Our scheme eases out the revocation mechanism and enables key revocation in the legacy systems. It discusses the architecture as well as the performance of our scheme as compared to the existing scheme. However, our scheme does not call for the entire change in PKI, but is compatible with the existing scheme. Our simulations show that the proposed scheme is better for key revocation.
引用
收藏
页码:281 / 295
页数:15
相关论文
共 50 条
  • [41] Link Layer Key Revocation and Rekeying for the Adaptive Key Establishment Scheme
    Bock, Benedikt
    Matysik, Jan-Tobias
    Krentz, Konrad-Felix
    Meinel, Christoph
    2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2019, : 374 - 379
  • [42] Efficient Revocable ID-Based Signature With Cloud Revocation Server
    Jia, Xiaoying
    He, Debiao
    Zeadally, Sherali
    Li, Li
    IEEE ACCESS, 2017, 5 : 2945 - 2954
  • [43] Leakage Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server
    Tseng, Yuh-Min
    Wu, Jui-Di
    Huang, Sen-Shan
    Tsai, Tung-Tso
    INFORMATION TECHNOLOGY AND CONTROL, 2020, 49 (04): : 464 - 481
  • [44] Efficient revocable ID-based encryption with cloud revocation server
    Jia, Xiaoying
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    He, Debiao
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (01)
  • [45] Password Management: Distribution, Review and Revocation
    Lopriore, Lanfranco
    COMPUTER JOURNAL, 2015, 58 (10): : 2557 - 2566
  • [46] Secure Key Renewal and Revocation for Wireless Sensor Networks
    Mansour, Ismail
    Chalhoub, Gerard
    Lafourcade, Pascal
    Delobel, Francois
    2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2014, : 382 - 385
  • [47] Self-healing group key distribution with time-limited node revocation for wireless sensor networks
    Jiang, Yixin
    Lin, Chuang
    Shi, Minghui
    Shen, Xuemin
    AD HOC NETWORKS, 2007, 5 (01) : 14 - 23
  • [48] A method for fast revocation of certificateless public key cryptography
    Ibrahim, Ibrahim I.
    Ibrahim, Maged H.
    Allam, Ali M.
    2006 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2006, : 250 - +
  • [49] Determining the impact of key climatic factors on geographic distribution of wild Akebia trifoliate
    Wang, Li
    Deng, Huanguang
    Qiu, Xinfa
    Wang, Peifa
    Yang, Fei
    ECOLOGICAL INDICATORS, 2020, 112
  • [50] Survey on key revocation mechanisms in wireless sensor networks
    Ge, Mengmeng
    Choo, Kim-Kwang Raymond
    Wu, Huai
    Yu, Yong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 63 : 24 - 38