Explore chapters and articles related to this topic
Key Management and Agreement in Distributed Systems
Published in Yang Xiao, Security in Distributed, Grid, Mobile, and Pervasive Computing, 2007
Venkata C. Giruka, Saikat Chakrabarti, Mukesh Singhal
The group key helps the group members in encrypting or decrypting group data, or for any subsequent cryptographic use. With such a group key, only those members that possess the key can access the group-specific data. However, distributing a group key securely to the group members is a nontrivial problem in itself. Furthermore, several practical systems involve dynamic groups where members join and leave the group at random. For each such event, the group key should be changed and distributed to the current group members securely to limit the access only to authorized members. For instance, a service provider of on-demand TV would certainly be interested in restricting the member-join only to the paid group members. Thus, when a member’s subscription expires, the service provider should make sure that the member should not be able to access the on-demand TV while keeping this membership change transparent to other group members.
Protection of Multimedia Content in Distribution Networks
Published in Borko Furht, Darko Kirovski, Multimedia Encryption and Authentication Techniques and Applications, 2006
Ahmet M. Eskicioglu, Edward J. Delp
Some of the challenging questions regarding these issues include the following: How does a group manager, if it exists, accept members to the group?How is the group key generated and distributed to members?How is multimedia data source authenticated by the receivers?How is the group key changed when a member joins or leaves a group?How does multicast multimedia data received by a member have a unique watermark?
Protection of Multimedia Content in Distribution Networks
Published in Borko Furht, Darko Kirovski, Multimedia Watermarking Techniques and Applications, 2006
Ahmet M. Eskicioglu, Edward J. Delp
Some of the challenging questions regarding these issues include the following: How does a group manager, if it exists, accept members to the group?How is the group key generated and distributed to members?How is multimedia data source authenticated by the receivers?How is the group key changed when a member joins or leaves a group?How does multicast multimedia data received by a member have a unique watermark?
A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles
Published in Connection Science, 2022
For increasing the efficiency of secure data transmission, this study proposes the group key mode and the ECDSA mode to deal with different scenarios. The group key mode accelerates the speed of secure communication once the members obtain the same group key. Only the vehicle owns the same group key that can take part in the communication. Others cannot take part in secure communication without the group key. Nevertheless, the ECDSA mode gives an optional way to achieve secure data transmission. When the members of IoV are abundant and huge, the time complexity of obtaining the system key takes longer time. The member can exploit the ECDSA mode to deal with secure data transmission, since the member has already owned the certificate, and thus the vehicle can sign the transmitted data to protect the transmitted data. The detailed presentation is as follows. The secure data transmission of IoV belongs to the same RSU authority: the group key agreement via RSU
Recommendations for smart grid security risk management
Published in Cyber-Physical Systems, 2019
Vikas Lamba, Nikola Šimková, Bruno Rossi
(5) Efficient cryptographic key management: SGs are composed of millions of devices sharing critical information using diverse communication protocols and technologies. Highly efficient and cost-effective key management schemes that can be employed over large scale are necessary [19]. Hence, conventional key management schemes such as public key infrastructure (PKI) do not seem to be the most viable solution for SGs. Group key management, where a central server is responsible for generation, distribution, and revocation of keys can be adopted as one of the recommended methods for scalable key management for SGs [62]. Furthermore, identity-based encryption (IBE) that eliminates the need for key distribution and key revocation may be a suitable option for effective key management for SGs [38]. Another option is attribute-based encryption (ABE) that eliminates the need for a trusted third party for distribution of keys [38,55]. Finally, mechanisms in which the secret key is not exchanged over the network may be considered as the most effective solution for SGs as they mitigate the risk of compromised keys [62,63].
Fault-Tolerant Based Group Key Servers with Enhancement of Utilizing the Contributory Server for Cloud Storage Applications
Published in IETE Journal of Research, 2023
K. Vivekrabinson, K. Muneeswaran
Proof: The term backward secrecy is defined as preventing the access of new users from the files which are communicated before the joining of the new user. To achieve backward secrecy, the server updates the group key from Ki,h to , whenever the user leaves as well as the user details are removed from the FAL of the files. If an attacker becomes the member of the group Gi and wants to access the old file information, he/she needs to recover the old group key Ki,h which is not possible. This is because there is no relationship between the old and new group keys. Thus the backward secrecy is maintained in the CGS scheme.