CFP last date
22 April 2024
Reseach Article

Computing Efficient Rekeying for Multicast Key Distribution with Least Computation Complexity

Published on November 2015 by Nilesh M.shidurkar
National Conference on Recent Trends in Mobile and Cloud Computing
Foundation of Computer Science USA
NCRMC2015 - Number 1
November 2015
Authors: Nilesh M.shidurkar
44ef4106-622e-415e-8c41-a8a0fac715ed

Nilesh M.shidurkar . Computing Efficient Rekeying for Multicast Key Distribution with Least Computation Complexity. National Conference on Recent Trends in Mobile and Cloud Computing. NCRMC2015, 1 (November 2015), 26-30.

@article{
author = { Nilesh M.shidurkar },
title = { Computing Efficient Rekeying for Multicast Key Distribution with Least Computation Complexity },
journal = { National Conference on Recent Trends in Mobile and Cloud Computing },
issue_date = { November 2015 },
volume = { NCRMC2015 },
number = { 1 },
month = { November },
year = { 2015 },
issn = 0975-8887,
pages = { 26-30 },
numpages = 5,
url = { /proceedings/ncrmc2015/number1/23313-2908/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Mobile and Cloud Computing
%A Nilesh M.shidurkar
%T Computing Efficient Rekeying for Multicast Key Distribution with Least Computation Complexity
%J National Conference on Recent Trends in Mobile and Cloud Computing
%@ 0975-8887
%V NCRMC2015
%N 1
%P 26-30
%D 2015
%I International Journal of Computer Applications
Abstract

An imperative issue for secure gathering openness is of the utmost importance dissemination. The majority of the incorporated gathering key administration plans utilize high rekeying expense. Here we present a novel methodology for calculation productive rekeying for multicast key conveyance. This methodology diminishes the rekeying expense by utilizing a mixture gathering key administration plan (including both concentrated and contributory key administration plans). The gathering controller uses the MDS Codes, a class of blunder control codes, to circulate the multicast key powerfully. Keeping in mind the end goal to maintain a strategic distance from successive rekeying as and when the client leaves, a novel methodology is presented where customers recompute the new gathering key with negligible calculation. This methodology guarantees forward mystery and additionally in reverse mystery and fundamentally lessens the rekeying expense and correspondence cost. This plan well suits remote applications where compact gadgets require low calculation.

References
  1. X. S. Li, Y. R. Yang, M. G. Gouda, and S. S. Lam, "Batch Rekeying for Secure Group Communications," Proc. 10th Int'l World Wide Web Conf. (WWW '01), pp. 525-534, May 2001.
  2. S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting," Proc. ACM SIGCOMM '97, pp. 277-288, Sept. 1997.
  3. C. Wong, M. Gouda, and S. Lam, "Secure Group Communication Using KeyGraphs," IEEE/ACM Trans. Networking, vol. 8, pp. 12-23, Feb. 2000.
  4. Peter S. Kruus and Joseph P. Macker, "Techniques and issues in multicast security," MILCOM98, 1998.
  5. Paul Judge and Mostafa Ammar, "Security Issues and Solutions in Multicast Content Distribution: A Survey", IEEE Network, February 2003, pp 30 – 36.
  6. M. Moyer, J. Rao and P. Rohatgi, "A Survey of Security Issues in Multicast Communications", IEEE Network Magazine, Vol. 13, No. 6, March 1999, pp. 12-23.
  7. Yan Sun, and K. J. Ray Liu, "Securing Dynamic Membership Information in Multicast Communications," IEEE INFO CONFERENCE 2004.
  8. F. J. MacWilliams and N. J. A. Sloane, The Theory of Error Correcting Codes. North- Holland Math. Library, 1977.
  9. M. S. Hwang, "Dynamic participation in a secure conference scheme for mobile communications," IEEE Trans. Veh. Technol. , vol. 48, pp. 1469–1474, Sept. 1999.
  10. Lihao Xu, Cheng Huang, "Computation Efficient Multicast Key Distribution," IEEE Trans. Parallel And Distributed Systems, Vol 19, No. 5, May 2008.
  11. Ran Canatti, Juan Garay, Gene Itkis, Daniel Micciancio, Moni Naor, and Benny Pankus, "Multicast Security: A taxanomy and some efficient constructions", IEEE Network, March 1999, pp 122-128.
  12. H. Harney and E. Harder, Logical Key Hierarchy Protocol, IETF Internet draft, work in progress, Mar. 1999.
  13. T. M. Cover and J. A. Thomas, Elements of Information Theory. John Wiley & Sons, 1991.
  14. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, fourth ed. CRC Press, 1999.
Index Terms

Computer Science
Information Sciences

Keywords

Erasure Decoding Key Distribution Mdscodes Multicast.