SlideShare a Scribd company logo
1 of 11
Download to read offline
Computer Engineering and Intelligent Systems                                                         www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3


       BKSGKMP: Blind Key Sequenced Group Key Management
                            Protocol
                                                 S Archana Reddy
                            Tudi Ram Reddy Institute of science & Technology, JNTU
                                     Bibinagar, Gudur, Andhra Pradesh, India
                                       E-mail: archanareddys22@gmail.com


                                                 J Srikanth
                                       Aurora’s Engineering College, JNTU
                                          Bhongiri, Andhra Pradesh, India
                                          E-mail: jsrikanth@aurora.ac.in

Abstract
Group communication is erupting in Internet world through social network, online chatting, Video/audio
conferencing and games. As internet is free and open environment and also the major medium of communication,
information security is the most important concern. Hence, the group members must be provided with security
services such as authentication, confidentiality, integrity and access control among themselves. To serve these
provisions, the group members must use a Group Key (GK), used to encrypt or decrypt the message
delivered/received. Many efficient and secure key generation techniques are developed for Group Keys. Of these,
Tree based Group Diffie Hellman (TGDH) group key agreement protocol is one of the most efficient. As internet,
having distributed computers has the characteristic of heterogeneity i.e. a person can access internet either through
PC, laptop, mobile computer, etc. Thus, TGDH and other group key agreement protocols have the assumption that
all the GK accessing people have the same capacity of computing. Hence, this research considers all the dimensions
including various diversities and improves efficiency of GK generation process by moving off low performing
candidates.
Key Words: Group key management, Scalability, Secure multicast, Re-keying.


1. Introduction
As we all know, today group communication act is mostly done through internet world through various social
networks, applications, video/audio conferencing etc. Security plays a major role in such contexts. As earlier paper
(Wong et al. 2000) argues that the process of authentication and key sharing is done before the start of group
communication session. As the GK has a vital role in group communication, all the group members donate for its
generation and usage. On the other hand, it has been reported that (Steiner et al. 2000) that the GK generation
process has many modular exponentiations included in it, making the process take a long time for computation even
if the number of members in the group are less (approx 100) . To provide tight security Wong et al. (2000) specified
that the GK must be changed after every updating of group members in order to provide privacy to every set of
group members .Thus, GK management is more concerned about the generation of efficient GK this point was made
number of times Kim et al. (2000) that the modular exponentiation which depends on number of group members is a
costly process. The usage of key trees in this context serves the purpose best by reducing the overhead of huge
computations. TGDH is one such tree based group key agreement protocol. The efficiency of TGDH is O(log2n), n
representing number of group members. One major drawback of TGDH is that it remains efficient until tree is kept
correctly balanced. But balancing a key tree is another problem to deal with. Moreover, according to TGDH as well
as other key management protocols, all the group members are in homogeneous environment. But, in reality,
                                                        160
Computer Engineering and Intelligent Systems                                                          www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
internet is a distributed computer network having the characteristic of heterogeneity, having different modes of
accessing media (PC, laptop, mobile). This may leads to some computation problems as person working from
mobile internet takes more time compared to person working from any workstation or PC. Also, if a person in a
group is far away from the other members in terms of location or in network latency area, the GK generation process
may become inefficient as several message sharing practices are required while generating GK. Thus, such members
leading to degradation of performance of GK generation process is deleted from the list. If instead of tree-based, we
use queue-based DH group key protocol, it improves latency of network and the heterogeneity of the network world.
Still it has an overhead of balancing tree every time the group members are updated. The queue based DH protocol
provides a Queue based divide and conquer algorithm, which needs comparatively less maintenance to accomplish
the task. This queue based mechanism is used to identify the fast and low performance members. The process of
identifying fast and low performance members is different in prior and proposed agreements. While tree-based
group key agreement does it by comparing elapsed times of the members to compute their public keys, the proposed
protocol uses Group key Controller Server (GCS). GCS asks all the members to compute their keys and store it in its
queue. It follows First-In - First- Out (FIFO) strategy to store and retrieve the data from the queue. The keys of the
members are stored from right to left based on their performance i.e. fastest on right followed by lowest on the left.
The proposed queue based protocol does not have additional overhead of tree balancing. As security and efficiency
are major concerns for the group communication, low performance members are found and logged off from the
group. Thus, this research is primarily concerned about improving GK generating process by increasing its usability
to the peak level.
1.1. Related work
Group communication can be at different levels it can range from the level of multi casting to the level of
conferencing using groupware or social networking applications. Many security services are indulged in the
communication process to provide high level of security. This can be done by following security mechanisms for key
distribution and communication session. The key management wing is the base for the secure communication as it is
the one concerned with safe key generation and distribution. Another main aspect to consider for safer
communication is to have a secure channel to destine our messages correctly. In node to node communication, the
management of GK can be done in two ways. First is the Centralized group key distribution which makes use of a
key server for GK management. In this method the generation and distribution of GK can be made possible with the
use of a Trusted Third Party (TTP). But, this approach may have two drawbacks Firstly: TTP should be always
available and Secondly : TTP should be a member of every subset of the group to allow the continuous operation
even in the cases of network distribution. The first drawback is has been effective as Kim (2004) claims with fault
tolerance and replication methodologies. The second drawback is that it is impossible to attain in an efficient
procedure. In one-to-many multicast cases, the centralized technique serves well, because in this case the TTP is
physically near to the communication source and thus can support continuous operation even in the case of network
distribution. But, mostly one-to-many multicast process is aimed at only partition having the source. In case of
dynamic node to node communication, the communication must be continuous even if the number of network
partitions is variable. Kim et al. (2004) argues that in such cases, centralized technique may not be suited well. For
these exclusive cases, the second approach is more applicable, i.e. decentralized group key distribution also called
group key agreement. It includes the generation and distribution of key dynamically. Unlike centralized key
distribution which is based on single entity, contributory distribution is a contribution based key management
technique. It requires contribution from every group member for the GK. This avoids the need of TTP and thus
avoiding single point failure. This approach is well applicable to peer-to-peer communication, since it allows
contribution for shared key from all the peers. Hence, this research is concerned with the decentralized and
contributory GK management. Presently, there are five key agreement protocols available. They are:

1. CKD (Centralized Key Distribution)
One possible definition (Amir et al. pp.330-343, 2000) is CKD and GDH are similar to each other except that CKD
has a CKD center to generate and distribute GK to every group member.
         GK = gK1K2K3K4……Kn-1Kn


                                                        161
Computer Engineering and Intelligent Systems                                                      www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
2. BD (Burmester-Desmedt)
On other hand, it has been reported (Burmester et al, pp. 275-286, 1994.) that this protocol allows dynamic group
functions. It has less computational overhead due to the presence of two modular exponentiations. But, it has a
drawback of needing large message exchanges for the generation of GK.
        GK = gK1K2+K2K3+……+Kn-1Kn

3. TGDH (Tree based Group Diffie Hellman)
Kim (2004) argued that it is one of the most efficient group key agreement protocols having less communication and
computation (O(log n) modular exponentiation) overhead. It has the advantage of provides robustness.
                     k1k2 g k3k4 ..... kn1.... kn1kn

GK  g          gg                     g       g
                                   g


4. GDH (Group Diffie Hellman)
Steiner & Tsudik (2000) argues that this protocol though assures high level of security, has included high
computational cost too (O(n) modular exponentiation) and it hardly provide robustness.
        GK = gK1K2K3K4……Kn-1Kn

5. STR (Skinny Tree)
Wong & Gouda (2000) argues that it is updated to support dynamic group operations. It has the advantages of low
communication overhead, robustness and well suited to add new member in the group. The only backlog of this
protocol is it is difficult to exclude a group member (O(n) modular exponentiation)

                                          k2 g k1
                      kn g kn1    .... g
GK  g
1.2. Tree- based Group Diffie Hellman (TGDH)
It is a tree based extension of DH key exchange protocol. The computation of GK plays a major role for a secure
group communication. Hence, this point has been made a number of times (Tsudik 2000, 2004; Burmester, and
Desmedt 1994; Fratto 2001; Kim & Perrig 2004; Steiner & Waidner 2000; Wong, Gouda & Lam2000) but the each
group member has his contribution for the key computation. Thus, GK management mainly aims at decrementing
GK computational overhead which occurs due to the inherent expensive cryptographic operations [19]. Hence, to
reduce the overhead of GK computation, a key tree structure is adapted which reduces the number of times of
computations. On other hand, Amir et al (2000 pp. 330-343) has reported that the key trees are even implemented in
centralized group key generation to decrease the complexity of key management Hong & Benitez (2006) argues that
the TGDH is one of such Group key Generation Protocols (GKGPs). Let us consider an example.




                                                         162
Computer Engineering and Intelligent Systems                                                            www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3




                              Figure 1: A binary tree for generating group key

In the binary key tree for generating a GK in Figure 1, each node < l, v > represents a vth node at level l in the tree
and node < l, v >’s secret (private) key K<l, v> and a blind (public) key BK<l, v> = f (K<l, v>) = gK<l, v>mod p, where g
and p are 1,024 bit long integers. Every member holds the secret key along the key path. For simplicity, assume each
member knows the blind keys in the key tree. The key paths are the shadowed nodes (node < 0, 0 >, < 1, 0 > and <
2, 0 >) in Figure 1. The final group key K < 0, 0 > in Figure 1 is computed with the key paths using blind keys BK<3,
0>, BK<3, 1>, BK<2, 1>, BK<2, 2>, BK<3,2>, and BK<3, 3> . Therefore, the final group key can be computed as Equation (1):


                                          g 3,0 3,1 g  2,1 g  2,2 g  3,2  3,3
                                           k     k       k        k        k      k

                          K0,0  g g                          g

                                                                                            …… (1)

Even TGDH has two drawbacks First balancing GK generation tree which is an overhead. The balance process
should maintain the efficiency of the GK computation to O (log2n). Else, the performance goes worse. The second
drawback is the member’s diversity when a new member joins the group. The updating of a new member from a
diverse environment may disturb the time for key generation. Hence, to deal with these problems, we introduce a
new protocol.
1.3. Problem definition
The members in the group apart from being in distributed environment can be physically varied over internet.
Moreover, the members can be in the environment with the characteristic of heterogeneity. Standard GK agreement
protocols make all the group members to donate for the generation of GK. Furthermore, any member leading to
degrade of performance is logged off and the members having fast performance must be authorized to contribute in
the generation and distribution of GK. The GKGP depends upon the computing capacity of group members and
network latency. Hence, in order to avoid the time delay and performance degradation, we better delete less
performance candidates from the management process.
2. Blind Key sequenced group key management protocol [BKSGKMP]
The below figure shows the Blind Key Sequenced Group key entity model. The BKSGKMP has a database having
the list of currently login members, user IDs, their passwords, MAC (Media Access Control) addresses and Blind
key queues. Hong, & Benitez (2005) argues that the whenever a member logins to the server, it compares his ID,
password and MAC address from the database in the server. After authenticating group members, they participate in
the GK generation by storing their respective blind keys into the server. The server, now, saves all such keys into a


                                                              163
Computer Engineering and Intelligent Systems                                                              www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
queue called Blind Key Queue (BKQ) in FIFO order. Later, the server announces the members who will involve in
the GK generation at the next stage.




                       Figure 2: Blind Key Sequenced Group key entity model

 On other hand, Moser et al.(1994) reported that the BKSGKMP is very much equivalent to Virtual Synchrony (VS)
which makes use of a client daemon program for managing the members. VS runs on every machine of member and
synchronizes with every member to manage the members with every update of the group members set. VS is used to
know the status of all other members of the group. But, the usage of VS may be complicated as it needs to
synchronize every member of the group because members keep on changing their status and thus need a lot of
exchanges. Thus, BKSGKMP uses GCS server which reduces the effort of maintaining daemons. Hence, GCS is
taken care by only one machine in our protocol.

Present process of authentication is to use a self signed certificate. But, it lacks to make sure that the sign is from the
actual member or not. Hence, to overcome this drawback we use GCS as a fully trusted party. The threat model
considers both passive and active outsiders (people who are not authenticated members). Eavesdropping is a passive
outsider attack for finding out the keys where as inserting, removing, changing and delaying protocol messages can
be considered as active outsider attacks.

BKSGKMP invites only fast performing members having less network latency to participate in the GK generation
and thus improving efficiency of the management system. The GK must be updated with every change in the set of
group members. The details of the proposed procedure are explained as following:




                                                           164
Computer Engineering and Intelligent Systems                                                            www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3




                                          Fig 3: Set of BK queues in server

Let us assume that number of group members is n and members are M1, M2, M3, … Mn-1, Mn for n<100. GCS asks
all group members to compute blind key g Ki mod p, where 1<=i<=n, g is exponential base, p is a prime number and
Ki is the ith private key. GCS collects all keys and save them in its queue according to FIFO order. This is used to
identify fast performance candidates to invite them for GKGP at the next stage. The keys are stored from left to right
i.e. placing keys of fast performance candidates at front and that of less performance candidates at the rear of the
queue. Two factors are taken into consideration for computing performance of candidates. They are their computing
capacity and network latency. Even if the performance of a candidate is high, if his message exchange time is more,
then he is also considered to be a low performance candidate and thus be filtered. Thus, BKQ is used to determine
performance considering both parameters at a time. The number of levels in the GK generation process is calculated
by the number of group members. If group size is n, then number of levels will be log2(n+1). At level 1, blind key is
generated followed by assigning two opposite blind keys together to next level. Then the members in the colored
region are asked to calculate Diffie Hellman key exchange using those two blind keys and to save them in the queue
in (First Come First Serve) FCFS order at each and every level. As in the figure 3, the fastest performing candidate’s
key is stored at A1, second fastest at A2 and so on. The queue always allocate the key in the first cell, the key in the
last one i.e. member of A1 has to compute with the member of An. Thus, the blind keys of those two spots will be
computed. The process continues and the final GK is computed as




                                                                                    … (2)
                                                         165
Computer Engineering and Intelligent Systems                                                       www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3


         Here, only members in the colored region are invited in GKGP of next stage. Thus BKSGKMP avoids
delays and performance degradation.
3. Performance Analysis
Here, we analyze the cost of computation and network latency for enter, exit, combine and divide of the
BKSGKMP. To depict the performance of BKSGKMP, total elapsed time was found for various key generation
protocols and they are compared to show that BKSGKMP is a better choice. Total elapsed time is the time from the
joining into the group to the time when GKGP completes. The above mentioned information can be seen in the
following figures from 4 to 7.
3.1. Membership Operations
BKSGKMP must be capable of providing different functions to the members with every update of the group set.
BKSGKMP provides some protocols to allow such functions. They are:
1.      Partition: a set of members divided from the group.
2.      Merge: a set of previously divided group is allowed to join with the present group.
3.      Join: a person is added to the group.
4.      Leave: a person is deleted from the group.
The analysis is mainly aimed at the complete number of control messages, the number of exchanges, drawbacks
included and the cost of GKGP. The whole cost is the summation of all members’ costs included in the generation
process at each stage. The proposed BKSGKMP is compared with all above mentioned various available GK
agreement protocols. Let us see the comparison in the form of a table having the present group size, no. of members
joined/ exited/merged which are denoted by n, m, k (m>=k) and p respectively.




                      Table 1: Communication and computation costs summary


The above table compares the communication and computation costs of these five protocols is taken from Fratto
(2001 pp. 69-77) Here, no. of rounds implies no. of exchanges happened between group members. Whenever a
person enters into the group, GCS asks the existing members to compute a new blind key which is the foremost
stage. In the next stage, all the blind keys are collected from all existing members. Where in join, two stages are
                                                       166
Computer Engineering and Intelligent Systems                                                            www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
required; we need only one stage in case of leaving, as exiting person just informs all other group members through
a single broadcast. Moreover, the no. of messages exchanged is also reduced to half of the prior stage. The infinite
series α+ αr+ αr2+…..+ αrn (n is infinite) is convergent and its sum is α / (1-r) iff -1<r<1[1]. Here, α = n-1 and r=1/2.
Hence, at last, no. of messages is calculated based on this series leading to sum as (n-1)/(1-1/2) = 2n-2. In case of
division has the value (n-1)/m and r=1/2. Here, the value of α varies from other ones. Finally, the no. of messages
((n-1)/m)/(1-1/2) must be multiplied with m. Hence, the whole no. of messages (2n-2) is same in all cases.




                       Table 2: Total messages in join and leave for BKSGKMP


As it is known that modular exponentiation, which depends on number of group members, Fratto (2001) argues that
this is more expensive operation in case of TGDH and STR [8]. Thus, there is a direct relationship between no. of
group members and computational overhead.
3.2. Test Method
In order to do concise comparisons, the values of g, k, p are taken 1,024 bits long in all calculations. Lenstra (1999)
argued that these values are considered to be safe in present tech world. Apart from it, a technique is followed to
calculate the delay. Here, n represents no. of existing group members for all the protocols, where n = 10, 20, 30, 40,
50 and 60. The test bed chosen for this trial is a 64 Intel Pentium machine running Windows XP. As it was assumed
that all participators of GKGP are physically located uniformly across LAN (Local Area Network), one member
from each area must act as GCS to control GKGP with out participating in the generation process. With every entry
of a member, all the existing members calculate Blind keys and save it in the queue of BKQ; this is used to find out
low performance members and to oust them. To perform analysis test, the elapsed times are calculated for every
update of the group set. Tests are performed at GCS where the parameters of performance i.e. network latency and
computational delay is calculated for each member by exchanging messages between group members. It was tested
above 30 times by incrementing and decrementing a machine at a case. In case of LAN, the cost of computation is
comparatively less, between 17µsec and 25 µsec to send messages of length 1,024 bits. It may not be considered if
the no. of group members is 60 to the max. Most part of the calculated cost is due to computation. But, in case of
WAN (Wide Area Network), the overhead is completely regarding other thing. The elapsed time from USA to
Mozambique is 670 µsec; where the same in case from USA to Thailand is 420 µsec. Kim (2002) argued that the
LAN is million times faster than WAN . Let us leave the WAN based concept for later research. Thus, to show the
performance effectiveness of BKSGKMP, it was compared with other available protocols and thus proved.
3.3. Join Operation Results
The main drawbacks we face are computation and communication costs. Figure 4 depicts that BD and GDH are not
advisable in case of join cost (in terms of no. of group members). In the graphs, we denote x-axis with group size
and y-axis with cost of computation. But, in the same event, BKSGKMP, STR and TGDH are considered effective
as they make use of divide and conquer strategy to calculate GK. BKSGKMP is more efficient and is scaling
logarithmic in case of exponentiation size. TGDH as well as STR make use of binary tree to calculate GK.
BKSGKMP makes 2n-2 message exchanges which is large comparative to other protocols. The noticeable part here

                                                          167
Computer Engineering and Intelligent Systems                                                           www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
is that, the more no. of message exchanges does not adversely affect the efficiency as the time to exchange messages
is 20 µsec to the most. Hence, BKSGKMP is considered more efficient comparatively to tree based protocols.




                                      figure 4--- join cost comparison

3.4. Leave Operation Results
The cost of exiting depends on the no. of members will be left in the group. Hence, the no. of members exiting from
the group doesn’t really affect. Hence, cost of leaving is similar to that of joining. But, in case of STR, the cost of
exiting depends on the physical existence of the member exiting the group in the key generation tree. Hence, in STR
exit cost is not same as entry cost.
3.5. Partition Operation Results
For experimental results, the group is divided into smaller groups and is requested to calculate the GK of their
individual groups. In case of BKSGKMP, STR and TGDH, the physical existence of the member do matter; where
as it doesn’t in case of BD and GDH. In TGDH each time a partition occurs, the members of the group have to
update their binary trees which may not be feasible leading to TGDH as an inefficient protocol. But, in other
protocols the result is similar to reverse of leave event.
3.6. Merge Operation Results
The merge event happens after correcting the network error. The performances of all the protocols but GDH are
better. The reason is that GDH depends on the no. of existing group members. Apart from it, it has n+2m+1
exponentiations and n+2m+1 communications. The same doesn’t matter in other protocols where merge event is
similar to that of leave one. Thus, it can be concluded that protocols with divide and conquer strategy perform
consistent.
Based on these results, BKSGKMP is better performing protocol apart from its large message exchanges.
BKSGKMP makes use of a queue to calculate GK. Along with it, BKSGKMP considers heterogeneity and thus
allow only certain members to join the group. Thus, heterogeneity is considered in case of distributed group
members to improve the effectiveness of GKGP.
4. Conclusions
Tight security mechanisms are needed to allow secure communication among the group members. Thus, a
communication session must have security services to provide authentication, integrity, and confidentiality. Group
Key (GK) is the primary and key part of the safe group communication. The performance of GK generation process,
which is required for secure communication, may degrade due to less performing members. Thus, the generation
process must be done is a more precise way but filtering less performing members. Many changes are occurring in
the recent years as increase in usage of mobile computers, network clusters communication with standard servers.
Apart from this, heterogeneity and distributed computer environment became common in the current internet world.
Thus, GK management system must consider various parameters, differences and environments involved in the
communication. These considerations as the basis, the effectiveness of BKSGKMP protocol in comparison to other

                                                         168
Computer Engineering and Intelligent Systems                                                        www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
protocols is proved. This protocol improves the efficiency by considering the parameters effecting the performance
i.e. computational delay and network latency. Thus, this research is aimed at and thus proved that GKGP is more
efficient and maximizes the applicability of communication.


References

M. Abramowitz, and I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical
Tables, 9th printing, New York: Dover, p. 10, 1972.
Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. N. Rotaru, T. Schlossnagle, J. Schultz, J. tanton, and G. Tsudik, Secure
group communication in asynchronous networks with failures, Integration and experiments," IEEE International
Conference on Distributed Computing Systems, pp. 330-343, 2000.
 Y. Amir, Y. Kim, C. N. Rotaru, J. Schultz, and J. Stanton, Secure group communication using robust contributory
key agreement," IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 4, pp. 468-480, Apr. 2004.
 Y. Amir, Y. Kim, and C. N. Rotaru, On the performance of group key agreement protocols," ACM Transactions on
Information and System Security, vol. 7, no. 3, pp. 457-488, 2004.
 E. Bresson, O. Chevassut, D. Pointcheval, amd J. Quisquater, Provably authenticated group Diffie Hellman key
exchange," Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 255-264,
Philadelphia, PA, 2001.
M. Burmester, and Y. Desmedt, A secure and efficient conference key distribution system," Advancesin Cryptology
- Eurocrypt'94, pp. 275-286, 1994.
 W. Diffie, and M. E. Hellman, New directions in cryptography," IEEE Transactions on Information Theory, IT-
vol. 22, no. 6, pp. 644-654. Nov. 1976.
M. Fratto, In PKI Ww Trust?," Network Computing, vol.12, no. 18, pp. 69-77, Sep., 2001.
S. Hong, and N. L. Benitez, Media access control (MAC) address-based group key authentication scheme," The 9th
World Multi conference on Systemics, Cybernetics and Informatics, pp. 160-164, Orlando, Florida, USA, July 2005.
 S. Hong, and N. L. Benitez, Enhanced Group Key Computation Protocol," The 2006 International Conference on
Security and Management (SAM'06), Las Vegas, USA, June 26-29, 2006.


Y. Kim, A. Perrig, and G. Tsudik, Simple and fault-tolerant key agr S. Hong, and N. L. Benitez eement for dynamic
collaborative groups," The 7th ACM Conference on Computer and Communications Security, pp. 235-244, ACM
Press, Athens, Greece, Nov. 2000.
 Y. Kim, A. Perrig, and G. Tsudik, Communication efficient group key agreement," 17th International Information
Security Conference (IFIP SEC'01), pp. 229-244, June 2001.
Y. Kim, Group Key Agreement: Theory and Practice, Ph.D. thesis, May 2002.
Y. Kim, A. Perrig, and G. Tsudik, Tree-based group key agreement," ACM Transactions on Information and
System Security, pp. 60-96, 2004.
A. K. Lenstra, and E. R. Verheul. Selecting cryptographic key sizes," 99 PricewaterhouseCoopers CCE newsletter,
Nov. 1999. http://www.cryptosavvy.com/
 L. E. Moser, Y. Amir, P. M. M. Smith, and D. A. Agarwal, Extended virtual synchrony," Proceedings of the IEEE
14th International Conference on Distributed Computing Systems, pp. 56-65, IEEE Computer Society Press, Los
Alamitos, CA, 1994.
 M. Steiner, G. Tsudik and M. Waidner, Key agreement in dynamic peer groups," IEEE Transactions on Parallel
and Distributed Systems, vol. 11, no. 8, pp. 769-780, Aug. 2000.

                                                       169
Computer Engineering and Intelligent Systems                                                     www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Vol 2, No.3
D. Wallner, E. Harder, and R. Agee, Key Management for Multicast: Issues and Architecture, Internet-Draft draft-
wallner-keyarch-00.txt, June 1997.
C. Wong, M. Gouda, and S. Lam, Secure group communications using key graphs," IEEE/ACM Transactions on
Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.




                                                     170

More Related Content

What's hot

Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewCSCJournals
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
 
Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...ijait
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
 
Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...CSCJournals
 
Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...Shailesh kumar
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015Ashish Gupta
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...NurrulHafizza
 
Do s and d dos attacks at osi layers
Do s and d dos attacks at osi layersDo s and d dos attacks at osi layers
Do s and d dos attacks at osi layersHadeel Sadiq Obaid
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...ijseajournal
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 

What's hot (19)

Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
 
Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...
 
Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...
 
Do s and d dos attacks at osi layers
Do s and d dos attacks at osi layersDo s and d dos attacks at osi layers
Do s and d dos attacks at osi layers
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 

Viewers also liked

еф презентація 2013
еф презентація 2013 еф презентація 2013
еф презентація 2013 ICOM Capital
 
SilverPens
SilverPensSilverPens
SilverPensrmbohra
 
Golden Seal Catalogue
Golden Seal CatalogueGolden Seal Catalogue
Golden Seal CatalogueRakesh Sharma
 
College Campus Advocacy through Classroom Learning Projects
College Campus Advocacy through Classroom Learning ProjectsCollege Campus Advocacy through Classroom Learning Projects
College Campus Advocacy through Classroom Learning ProjectsKylieMenagh
 
Groeistrategie Diversificatie: Introductie van Wasbier
Groeistrategie Diversificatie: Introductie van WasbierGroeistrategie Diversificatie: Introductie van Wasbier
Groeistrategie Diversificatie: Introductie van WasbiervandeBurgt
 
PAN Clinical Trials Awareness Campaign Agnew
PAN Clinical Trials Awareness Campaign   AgnewPAN Clinical Trials Awareness Campaign   Agnew
PAN Clinical Trials Awareness Campaign AgnewPAN - NACCDO
 
Aminoácidos y péptidos
Aminoácidos y péptidosAminoácidos y péptidos
Aminoácidos y péptidosDancer
 
La ricchezza delle famiglie italiane
La ricchezza delle famiglie italianeLa ricchezza delle famiglie italiane
La ricchezza delle famiglie italianeidealistait
 
Mukesh ambani picks share in eih
Mukesh ambani picks share in eihMukesh ambani picks share in eih
Mukesh ambani picks share in eihrayman0209
 
тренінг
тренінгтренінг
тренінгsemyurihor
 
Syntese brand content 2014 by limelight
Syntese brand content 2014 by limelightSyntese brand content 2014 by limelight
Syntese brand content 2014 by limelightBVA Limelight
 
Money Market Failings
Money Market FailingsMoney Market Failings
Money Market Failingsjohnfarthing
 

Viewers also liked (18)

еф презентація 2013
еф презентація 2013 еф презентація 2013
еф презентація 2013
 
VI
VIVI
VI
 
SilverPens
SilverPensSilverPens
SilverPens
 
Velocityconcrete
VelocityconcreteVelocityconcrete
Velocityconcrete
 
Golden Seal Catalogue
Golden Seal CatalogueGolden Seal Catalogue
Golden Seal Catalogue
 
Can You Dig It - The Ergonomics of Gardening
Can You Dig It - The Ergonomics of GardeningCan You Dig It - The Ergonomics of Gardening
Can You Dig It - The Ergonomics of Gardening
 
110330e13
110330e13110330e13
110330e13
 
College Campus Advocacy through Classroom Learning Projects
College Campus Advocacy through Classroom Learning ProjectsCollege Campus Advocacy through Classroom Learning Projects
College Campus Advocacy through Classroom Learning Projects
 
Groeistrategie Diversificatie: Introductie van Wasbier
Groeistrategie Diversificatie: Introductie van WasbierGroeistrategie Diversificatie: Introductie van Wasbier
Groeistrategie Diversificatie: Introductie van Wasbier
 
Biologia
BiologiaBiologia
Biologia
 
2
22
2
 
PAN Clinical Trials Awareness Campaign Agnew
PAN Clinical Trials Awareness Campaign   AgnewPAN Clinical Trials Awareness Campaign   Agnew
PAN Clinical Trials Awareness Campaign Agnew
 
Aminoácidos y péptidos
Aminoácidos y péptidosAminoácidos y péptidos
Aminoácidos y péptidos
 
La ricchezza delle famiglie italiane
La ricchezza delle famiglie italianeLa ricchezza delle famiglie italiane
La ricchezza delle famiglie italiane
 
Mukesh ambani picks share in eih
Mukesh ambani picks share in eihMukesh ambani picks share in eih
Mukesh ambani picks share in eih
 
тренінг
тренінгтренінг
тренінг
 
Syntese brand content 2014 by limelight
Syntese brand content 2014 by limelightSyntese brand content 2014 by limelight
Syntese brand content 2014 by limelight
 
Money Market Failings
Money Market FailingsMoney Market Failings
Money Market Failings
 

Similar to 15 s archana reddy final paper--160-170

An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...Alexander Decker
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
 
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...cscpconf
 
A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...csandit
 
An authenticated key management scheme for securing big data environment
An authenticated key management scheme for securing big data  environmentAn authenticated key management scheme for securing big data  environment
An authenticated key management scheme for securing big data environmentIJECEIAES
 
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret KeyIRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret KeyIRJET Journal
 
A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesA Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesIOSR Journals
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONA SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONacijjournal
 
Elliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed NetworkElliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed Networkijceronline
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageIOSR Journals
 
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...1crore projects
 

Similar to 15 s archana reddy final paper--160-170 (20)

An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
 
231 236
231 236231 236
231 236
 
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
 
A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...
 
An authenticated key management scheme for securing big data environment
An authenticated key management scheme for securing big data  environmentAn authenticated key management scheme for securing big data  environment
An authenticated key management scheme for securing big data environment
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret KeyIRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
 
A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesA Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast Services
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONA SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
 
Elliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed NetworkElliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed Network
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
K017115359
K017115359K017115359
K017115359
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
 
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Recently uploaded (20)

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

15 s archana reddy final paper--160-170

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 BKSGKMP: Blind Key Sequenced Group Key Management Protocol S Archana Reddy Tudi Ram Reddy Institute of science & Technology, JNTU Bibinagar, Gudur, Andhra Pradesh, India E-mail: archanareddys22@gmail.com J Srikanth Aurora’s Engineering College, JNTU Bhongiri, Andhra Pradesh, India E-mail: jsrikanth@aurora.ac.in Abstract Group communication is erupting in Internet world through social network, online chatting, Video/audio conferencing and games. As internet is free and open environment and also the major medium of communication, information security is the most important concern. Hence, the group members must be provided with security services such as authentication, confidentiality, integrity and access control among themselves. To serve these provisions, the group members must use a Group Key (GK), used to encrypt or decrypt the message delivered/received. Many efficient and secure key generation techniques are developed for Group Keys. Of these, Tree based Group Diffie Hellman (TGDH) group key agreement protocol is one of the most efficient. As internet, having distributed computers has the characteristic of heterogeneity i.e. a person can access internet either through PC, laptop, mobile computer, etc. Thus, TGDH and other group key agreement protocols have the assumption that all the GK accessing people have the same capacity of computing. Hence, this research considers all the dimensions including various diversities and improves efficiency of GK generation process by moving off low performing candidates. Key Words: Group key management, Scalability, Secure multicast, Re-keying. 1. Introduction As we all know, today group communication act is mostly done through internet world through various social networks, applications, video/audio conferencing etc. Security plays a major role in such contexts. As earlier paper (Wong et al. 2000) argues that the process of authentication and key sharing is done before the start of group communication session. As the GK has a vital role in group communication, all the group members donate for its generation and usage. On the other hand, it has been reported that (Steiner et al. 2000) that the GK generation process has many modular exponentiations included in it, making the process take a long time for computation even if the number of members in the group are less (approx 100) . To provide tight security Wong et al. (2000) specified that the GK must be changed after every updating of group members in order to provide privacy to every set of group members .Thus, GK management is more concerned about the generation of efficient GK this point was made number of times Kim et al. (2000) that the modular exponentiation which depends on number of group members is a costly process. The usage of key trees in this context serves the purpose best by reducing the overhead of huge computations. TGDH is one such tree based group key agreement protocol. The efficiency of TGDH is O(log2n), n representing number of group members. One major drawback of TGDH is that it remains efficient until tree is kept correctly balanced. But balancing a key tree is another problem to deal with. Moreover, according to TGDH as well as other key management protocols, all the group members are in homogeneous environment. But, in reality, 160
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 internet is a distributed computer network having the characteristic of heterogeneity, having different modes of accessing media (PC, laptop, mobile). This may leads to some computation problems as person working from mobile internet takes more time compared to person working from any workstation or PC. Also, if a person in a group is far away from the other members in terms of location or in network latency area, the GK generation process may become inefficient as several message sharing practices are required while generating GK. Thus, such members leading to degradation of performance of GK generation process is deleted from the list. If instead of tree-based, we use queue-based DH group key protocol, it improves latency of network and the heterogeneity of the network world. Still it has an overhead of balancing tree every time the group members are updated. The queue based DH protocol provides a Queue based divide and conquer algorithm, which needs comparatively less maintenance to accomplish the task. This queue based mechanism is used to identify the fast and low performance members. The process of identifying fast and low performance members is different in prior and proposed agreements. While tree-based group key agreement does it by comparing elapsed times of the members to compute their public keys, the proposed protocol uses Group key Controller Server (GCS). GCS asks all the members to compute their keys and store it in its queue. It follows First-In - First- Out (FIFO) strategy to store and retrieve the data from the queue. The keys of the members are stored from right to left based on their performance i.e. fastest on right followed by lowest on the left. The proposed queue based protocol does not have additional overhead of tree balancing. As security and efficiency are major concerns for the group communication, low performance members are found and logged off from the group. Thus, this research is primarily concerned about improving GK generating process by increasing its usability to the peak level. 1.1. Related work Group communication can be at different levels it can range from the level of multi casting to the level of conferencing using groupware or social networking applications. Many security services are indulged in the communication process to provide high level of security. This can be done by following security mechanisms for key distribution and communication session. The key management wing is the base for the secure communication as it is the one concerned with safe key generation and distribution. Another main aspect to consider for safer communication is to have a secure channel to destine our messages correctly. In node to node communication, the management of GK can be done in two ways. First is the Centralized group key distribution which makes use of a key server for GK management. In this method the generation and distribution of GK can be made possible with the use of a Trusted Third Party (TTP). But, this approach may have two drawbacks Firstly: TTP should be always available and Secondly : TTP should be a member of every subset of the group to allow the continuous operation even in the cases of network distribution. The first drawback is has been effective as Kim (2004) claims with fault tolerance and replication methodologies. The second drawback is that it is impossible to attain in an efficient procedure. In one-to-many multicast cases, the centralized technique serves well, because in this case the TTP is physically near to the communication source and thus can support continuous operation even in the case of network distribution. But, mostly one-to-many multicast process is aimed at only partition having the source. In case of dynamic node to node communication, the communication must be continuous even if the number of network partitions is variable. Kim et al. (2004) argues that in such cases, centralized technique may not be suited well. For these exclusive cases, the second approach is more applicable, i.e. decentralized group key distribution also called group key agreement. It includes the generation and distribution of key dynamically. Unlike centralized key distribution which is based on single entity, contributory distribution is a contribution based key management technique. It requires contribution from every group member for the GK. This avoids the need of TTP and thus avoiding single point failure. This approach is well applicable to peer-to-peer communication, since it allows contribution for shared key from all the peers. Hence, this research is concerned with the decentralized and contributory GK management. Presently, there are five key agreement protocols available. They are: 1. CKD (Centralized Key Distribution) One possible definition (Amir et al. pp.330-343, 2000) is CKD and GDH are similar to each other except that CKD has a CKD center to generate and distribute GK to every group member. GK = gK1K2K3K4……Kn-1Kn 161
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 2. BD (Burmester-Desmedt) On other hand, it has been reported (Burmester et al, pp. 275-286, 1994.) that this protocol allows dynamic group functions. It has less computational overhead due to the presence of two modular exponentiations. But, it has a drawback of needing large message exchanges for the generation of GK. GK = gK1K2+K2K3+……+Kn-1Kn 3. TGDH (Tree based Group Diffie Hellman) Kim (2004) argued that it is one of the most efficient group key agreement protocols having less communication and computation (O(log n) modular exponentiation) overhead. It has the advantage of provides robustness. k1k2 g k3k4 ..... kn1.... kn1kn GK  g gg g g g 4. GDH (Group Diffie Hellman) Steiner & Tsudik (2000) argues that this protocol though assures high level of security, has included high computational cost too (O(n) modular exponentiation) and it hardly provide robustness. GK = gK1K2K3K4……Kn-1Kn 5. STR (Skinny Tree) Wong & Gouda (2000) argues that it is updated to support dynamic group operations. It has the advantages of low communication overhead, robustness and well suited to add new member in the group. The only backlog of this protocol is it is difficult to exclude a group member (O(n) modular exponentiation) k2 g k1 kn g kn1 .... g GK  g 1.2. Tree- based Group Diffie Hellman (TGDH) It is a tree based extension of DH key exchange protocol. The computation of GK plays a major role for a secure group communication. Hence, this point has been made a number of times (Tsudik 2000, 2004; Burmester, and Desmedt 1994; Fratto 2001; Kim & Perrig 2004; Steiner & Waidner 2000; Wong, Gouda & Lam2000) but the each group member has his contribution for the key computation. Thus, GK management mainly aims at decrementing GK computational overhead which occurs due to the inherent expensive cryptographic operations [19]. Hence, to reduce the overhead of GK computation, a key tree structure is adapted which reduces the number of times of computations. On other hand, Amir et al (2000 pp. 330-343) has reported that the key trees are even implemented in centralized group key generation to decrease the complexity of key management Hong & Benitez (2006) argues that the TGDH is one of such Group key Generation Protocols (GKGPs). Let us consider an example. 162
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Figure 1: A binary tree for generating group key In the binary key tree for generating a GK in Figure 1, each node < l, v > represents a vth node at level l in the tree and node < l, v >’s secret (private) key K<l, v> and a blind (public) key BK<l, v> = f (K<l, v>) = gK<l, v>mod p, where g and p are 1,024 bit long integers. Every member holds the secret key along the key path. For simplicity, assume each member knows the blind keys in the key tree. The key paths are the shadowed nodes (node < 0, 0 >, < 1, 0 > and < 2, 0 >) in Figure 1. The final group key K < 0, 0 > in Figure 1 is computed with the key paths using blind keys BK<3, 0>, BK<3, 1>, BK<2, 1>, BK<2, 2>, BK<3,2>, and BK<3, 3> . Therefore, the final group key can be computed as Equation (1): g 3,0 3,1 g  2,1 g  2,2 g  3,2  3,3 k k k k k k K0,0  g g g …… (1) Even TGDH has two drawbacks First balancing GK generation tree which is an overhead. The balance process should maintain the efficiency of the GK computation to O (log2n). Else, the performance goes worse. The second drawback is the member’s diversity when a new member joins the group. The updating of a new member from a diverse environment may disturb the time for key generation. Hence, to deal with these problems, we introduce a new protocol. 1.3. Problem definition The members in the group apart from being in distributed environment can be physically varied over internet. Moreover, the members can be in the environment with the characteristic of heterogeneity. Standard GK agreement protocols make all the group members to donate for the generation of GK. Furthermore, any member leading to degrade of performance is logged off and the members having fast performance must be authorized to contribute in the generation and distribution of GK. The GKGP depends upon the computing capacity of group members and network latency. Hence, in order to avoid the time delay and performance degradation, we better delete less performance candidates from the management process. 2. Blind Key sequenced group key management protocol [BKSGKMP] The below figure shows the Blind Key Sequenced Group key entity model. The BKSGKMP has a database having the list of currently login members, user IDs, their passwords, MAC (Media Access Control) addresses and Blind key queues. Hong, & Benitez (2005) argues that the whenever a member logins to the server, it compares his ID, password and MAC address from the database in the server. After authenticating group members, they participate in the GK generation by storing their respective blind keys into the server. The server, now, saves all such keys into a 163
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 queue called Blind Key Queue (BKQ) in FIFO order. Later, the server announces the members who will involve in the GK generation at the next stage. Figure 2: Blind Key Sequenced Group key entity model On other hand, Moser et al.(1994) reported that the BKSGKMP is very much equivalent to Virtual Synchrony (VS) which makes use of a client daemon program for managing the members. VS runs on every machine of member and synchronizes with every member to manage the members with every update of the group members set. VS is used to know the status of all other members of the group. But, the usage of VS may be complicated as it needs to synchronize every member of the group because members keep on changing their status and thus need a lot of exchanges. Thus, BKSGKMP uses GCS server which reduces the effort of maintaining daemons. Hence, GCS is taken care by only one machine in our protocol. Present process of authentication is to use a self signed certificate. But, it lacks to make sure that the sign is from the actual member or not. Hence, to overcome this drawback we use GCS as a fully trusted party. The threat model considers both passive and active outsiders (people who are not authenticated members). Eavesdropping is a passive outsider attack for finding out the keys where as inserting, removing, changing and delaying protocol messages can be considered as active outsider attacks. BKSGKMP invites only fast performing members having less network latency to participate in the GK generation and thus improving efficiency of the management system. The GK must be updated with every change in the set of group members. The details of the proposed procedure are explained as following: 164
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Fig 3: Set of BK queues in server Let us assume that number of group members is n and members are M1, M2, M3, … Mn-1, Mn for n<100. GCS asks all group members to compute blind key g Ki mod p, where 1<=i<=n, g is exponential base, p is a prime number and Ki is the ith private key. GCS collects all keys and save them in its queue according to FIFO order. This is used to identify fast performance candidates to invite them for GKGP at the next stage. The keys are stored from left to right i.e. placing keys of fast performance candidates at front and that of less performance candidates at the rear of the queue. Two factors are taken into consideration for computing performance of candidates. They are their computing capacity and network latency. Even if the performance of a candidate is high, if his message exchange time is more, then he is also considered to be a low performance candidate and thus be filtered. Thus, BKQ is used to determine performance considering both parameters at a time. The number of levels in the GK generation process is calculated by the number of group members. If group size is n, then number of levels will be log2(n+1). At level 1, blind key is generated followed by assigning two opposite blind keys together to next level. Then the members in the colored region are asked to calculate Diffie Hellman key exchange using those two blind keys and to save them in the queue in (First Come First Serve) FCFS order at each and every level. As in the figure 3, the fastest performing candidate’s key is stored at A1, second fastest at A2 and so on. The queue always allocate the key in the first cell, the key in the last one i.e. member of A1 has to compute with the member of An. Thus, the blind keys of those two spots will be computed. The process continues and the final GK is computed as … (2) 165
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Here, only members in the colored region are invited in GKGP of next stage. Thus BKSGKMP avoids delays and performance degradation. 3. Performance Analysis Here, we analyze the cost of computation and network latency for enter, exit, combine and divide of the BKSGKMP. To depict the performance of BKSGKMP, total elapsed time was found for various key generation protocols and they are compared to show that BKSGKMP is a better choice. Total elapsed time is the time from the joining into the group to the time when GKGP completes. The above mentioned information can be seen in the following figures from 4 to 7. 3.1. Membership Operations BKSGKMP must be capable of providing different functions to the members with every update of the group set. BKSGKMP provides some protocols to allow such functions. They are: 1. Partition: a set of members divided from the group. 2. Merge: a set of previously divided group is allowed to join with the present group. 3. Join: a person is added to the group. 4. Leave: a person is deleted from the group. The analysis is mainly aimed at the complete number of control messages, the number of exchanges, drawbacks included and the cost of GKGP. The whole cost is the summation of all members’ costs included in the generation process at each stage. The proposed BKSGKMP is compared with all above mentioned various available GK agreement protocols. Let us see the comparison in the form of a table having the present group size, no. of members joined/ exited/merged which are denoted by n, m, k (m>=k) and p respectively. Table 1: Communication and computation costs summary The above table compares the communication and computation costs of these five protocols is taken from Fratto (2001 pp. 69-77) Here, no. of rounds implies no. of exchanges happened between group members. Whenever a person enters into the group, GCS asks the existing members to compute a new blind key which is the foremost stage. In the next stage, all the blind keys are collected from all existing members. Where in join, two stages are 166
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 required; we need only one stage in case of leaving, as exiting person just informs all other group members through a single broadcast. Moreover, the no. of messages exchanged is also reduced to half of the prior stage. The infinite series α+ αr+ αr2+…..+ αrn (n is infinite) is convergent and its sum is α / (1-r) iff -1<r<1[1]. Here, α = n-1 and r=1/2. Hence, at last, no. of messages is calculated based on this series leading to sum as (n-1)/(1-1/2) = 2n-2. In case of division has the value (n-1)/m and r=1/2. Here, the value of α varies from other ones. Finally, the no. of messages ((n-1)/m)/(1-1/2) must be multiplied with m. Hence, the whole no. of messages (2n-2) is same in all cases. Table 2: Total messages in join and leave for BKSGKMP As it is known that modular exponentiation, which depends on number of group members, Fratto (2001) argues that this is more expensive operation in case of TGDH and STR [8]. Thus, there is a direct relationship between no. of group members and computational overhead. 3.2. Test Method In order to do concise comparisons, the values of g, k, p are taken 1,024 bits long in all calculations. Lenstra (1999) argued that these values are considered to be safe in present tech world. Apart from it, a technique is followed to calculate the delay. Here, n represents no. of existing group members for all the protocols, where n = 10, 20, 30, 40, 50 and 60. The test bed chosen for this trial is a 64 Intel Pentium machine running Windows XP. As it was assumed that all participators of GKGP are physically located uniformly across LAN (Local Area Network), one member from each area must act as GCS to control GKGP with out participating in the generation process. With every entry of a member, all the existing members calculate Blind keys and save it in the queue of BKQ; this is used to find out low performance members and to oust them. To perform analysis test, the elapsed times are calculated for every update of the group set. Tests are performed at GCS where the parameters of performance i.e. network latency and computational delay is calculated for each member by exchanging messages between group members. It was tested above 30 times by incrementing and decrementing a machine at a case. In case of LAN, the cost of computation is comparatively less, between 17µsec and 25 µsec to send messages of length 1,024 bits. It may not be considered if the no. of group members is 60 to the max. Most part of the calculated cost is due to computation. But, in case of WAN (Wide Area Network), the overhead is completely regarding other thing. The elapsed time from USA to Mozambique is 670 µsec; where the same in case from USA to Thailand is 420 µsec. Kim (2002) argued that the LAN is million times faster than WAN . Let us leave the WAN based concept for later research. Thus, to show the performance effectiveness of BKSGKMP, it was compared with other available protocols and thus proved. 3.3. Join Operation Results The main drawbacks we face are computation and communication costs. Figure 4 depicts that BD and GDH are not advisable in case of join cost (in terms of no. of group members). In the graphs, we denote x-axis with group size and y-axis with cost of computation. But, in the same event, BKSGKMP, STR and TGDH are considered effective as they make use of divide and conquer strategy to calculate GK. BKSGKMP is more efficient and is scaling logarithmic in case of exponentiation size. TGDH as well as STR make use of binary tree to calculate GK. BKSGKMP makes 2n-2 message exchanges which is large comparative to other protocols. The noticeable part here 167
  • 9. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 is that, the more no. of message exchanges does not adversely affect the efficiency as the time to exchange messages is 20 µsec to the most. Hence, BKSGKMP is considered more efficient comparatively to tree based protocols. figure 4--- join cost comparison 3.4. Leave Operation Results The cost of exiting depends on the no. of members will be left in the group. Hence, the no. of members exiting from the group doesn’t really affect. Hence, cost of leaving is similar to that of joining. But, in case of STR, the cost of exiting depends on the physical existence of the member exiting the group in the key generation tree. Hence, in STR exit cost is not same as entry cost. 3.5. Partition Operation Results For experimental results, the group is divided into smaller groups and is requested to calculate the GK of their individual groups. In case of BKSGKMP, STR and TGDH, the physical existence of the member do matter; where as it doesn’t in case of BD and GDH. In TGDH each time a partition occurs, the members of the group have to update their binary trees which may not be feasible leading to TGDH as an inefficient protocol. But, in other protocols the result is similar to reverse of leave event. 3.6. Merge Operation Results The merge event happens after correcting the network error. The performances of all the protocols but GDH are better. The reason is that GDH depends on the no. of existing group members. Apart from it, it has n+2m+1 exponentiations and n+2m+1 communications. The same doesn’t matter in other protocols where merge event is similar to that of leave one. Thus, it can be concluded that protocols with divide and conquer strategy perform consistent. Based on these results, BKSGKMP is better performing protocol apart from its large message exchanges. BKSGKMP makes use of a queue to calculate GK. Along with it, BKSGKMP considers heterogeneity and thus allow only certain members to join the group. Thus, heterogeneity is considered in case of distributed group members to improve the effectiveness of GKGP. 4. Conclusions Tight security mechanisms are needed to allow secure communication among the group members. Thus, a communication session must have security services to provide authentication, integrity, and confidentiality. Group Key (GK) is the primary and key part of the safe group communication. The performance of GK generation process, which is required for secure communication, may degrade due to less performing members. Thus, the generation process must be done is a more precise way but filtering less performing members. Many changes are occurring in the recent years as increase in usage of mobile computers, network clusters communication with standard servers. Apart from this, heterogeneity and distributed computer environment became common in the current internet world. Thus, GK management system must consider various parameters, differences and environments involved in the communication. These considerations as the basis, the effectiveness of BKSGKMP protocol in comparison to other 168
  • 10. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 protocols is proved. This protocol improves the efficiency by considering the parameters effecting the performance i.e. computational delay and network latency. Thus, this research is aimed at and thus proved that GKGP is more efficient and maximizes the applicability of communication. References M. Abramowitz, and I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, 9th printing, New York: Dover, p. 10, 1972. Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. N. Rotaru, T. Schlossnagle, J. Schultz, J. tanton, and G. Tsudik, Secure group communication in asynchronous networks with failures, Integration and experiments," IEEE International Conference on Distributed Computing Systems, pp. 330-343, 2000. Y. Amir, Y. Kim, C. N. Rotaru, J. Schultz, and J. Stanton, Secure group communication using robust contributory key agreement," IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 4, pp. 468-480, Apr. 2004. Y. Amir, Y. Kim, and C. N. Rotaru, On the performance of group key agreement protocols," ACM Transactions on Information and System Security, vol. 7, no. 3, pp. 457-488, 2004. E. Bresson, O. Chevassut, D. Pointcheval, amd J. Quisquater, Provably authenticated group Diffie Hellman key exchange," Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 255-264, Philadelphia, PA, 2001. M. Burmester, and Y. Desmedt, A secure and efficient conference key distribution system," Advancesin Cryptology - Eurocrypt'94, pp. 275-286, 1994. W. Diffie, and M. E. Hellman, New directions in cryptography," IEEE Transactions on Information Theory, IT- vol. 22, no. 6, pp. 644-654. Nov. 1976. M. Fratto, In PKI Ww Trust?," Network Computing, vol.12, no. 18, pp. 69-77, Sep., 2001. S. Hong, and N. L. Benitez, Media access control (MAC) address-based group key authentication scheme," The 9th World Multi conference on Systemics, Cybernetics and Informatics, pp. 160-164, Orlando, Florida, USA, July 2005. S. Hong, and N. L. Benitez, Enhanced Group Key Computation Protocol," The 2006 International Conference on Security and Management (SAM'06), Las Vegas, USA, June 26-29, 2006. Y. Kim, A. Perrig, and G. Tsudik, Simple and fault-tolerant key agr S. Hong, and N. L. Benitez eement for dynamic collaborative groups," The 7th ACM Conference on Computer and Communications Security, pp. 235-244, ACM Press, Athens, Greece, Nov. 2000. Y. Kim, A. Perrig, and G. Tsudik, Communication efficient group key agreement," 17th International Information Security Conference (IFIP SEC'01), pp. 229-244, June 2001. Y. Kim, Group Key Agreement: Theory and Practice, Ph.D. thesis, May 2002. Y. Kim, A. Perrig, and G. Tsudik, Tree-based group key agreement," ACM Transactions on Information and System Security, pp. 60-96, 2004. A. K. Lenstra, and E. R. Verheul. Selecting cryptographic key sizes," 99 PricewaterhouseCoopers CCE newsletter, Nov. 1999. http://www.cryptosavvy.com/ L. E. Moser, Y. Amir, P. M. M. Smith, and D. A. Agarwal, Extended virtual synchrony," Proceedings of the IEEE 14th International Conference on Distributed Computing Systems, pp. 56-65, IEEE Computer Society Press, Los Alamitos, CA, 1994. M. Steiner, G. Tsudik and M. Waidner, Key agreement in dynamic peer groups," IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 8, pp. 769-780, Aug. 2000. 169
  • 11. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 D. Wallner, E. Harder, and R. Agee, Key Management for Multicast: Issues and Architecture, Internet-Draft draft- wallner-keyarch-00.txt, June 1997. C. Wong, M. Gouda, and S. Lam, Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000. 170