Advertisement

Cluster Computing

, Volume 22, Supplement 5, pp 11699–11711 | Cite as

Improved group key management region based cluster protocol in cloud

  • B. Umi SalmaEmail author
  • A. Arul Lawrence
Article
  • 265 Downloads

Abstract

Group key management protocol (GKMP) is an emergent protocol for secured group communication services like videoconferencing, video on demand, etc. GKMP provides the creation and distribution of keys within groups. The intervention of a centralized key manager is avoided with this technique. To improve the security in multicast environments, GKMP effectively combines region-clustering approach based on the theory of hyper sphere and re-encryption using projective geometry. This forms a region based cluster protocol. Security is handled in an effective way through digital signature technique namely EdDSA and projective geometry. This paper concentrates on applying the intelligent security algorithm over the group controller in a distributed environment. The comparison with conventional techniques prove that the proposed algorithm outperforms well in terms of improved security and reduced overhead in multicast environments. The region based cluster protocol scheme increases the scalability of GKMP scheme in cloud environments.

Keywords

Group controller Multicast Clusters Group key management Digital signature 

References

  1. 1.
    Seba, H.: FTKM: a fault-tolerant key management protocol for multicast communications. Comput. Secur. 25(6), 426–434 (2006)CrossRefGoogle Scholar
  2. 2.
    Augot, D., Bhaskar, R., Issarny, V., Sacchetti, D.: A three round authenticated group key agreement protocol for ad hoc networks. Pervasive Mob. Comput. 3(1), 36–52 (2007)CrossRefGoogle Scholar
  3. 3.
    Pour, A.N., Kumekawa, K., Kato, T., Itoh, S.: A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. Comput. Netw. 51(17), 4727–4743 (2007)CrossRefGoogle Scholar
  4. 4.
    Huang, D., Medhi, D.: A secure group key management scheme for hierarchical mobile ad hoc networks. Ad Hoc Netw. 6(4), 560–577 (2008)CrossRefGoogle Scholar
  5. 5.
    Cho, J.H., Chen, R., Wang, D.C.: Performance optimization of region-based group key management in mobile ad hoc networks. Perform. Eval. 65(5), 319–344 (2008)CrossRefGoogle Scholar
  6. 6.
    Cho, J.H., Chen, R.: Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Perform. Eval. 68(1), 58–75 (2011)CrossRefGoogle Scholar
  7. 7.
    Drira, K., Seba, H., Kheddouci, H.: ECGK: an efficient clustering scheme for group key management in MANETs. Comput. Commun. 33(9), 1094–1107 (2010)CrossRefGoogle Scholar
  8. 8.
    Fernandes, N.C., Duarte, O.C.M.B.: A lightweight group-key management protocol for secure ad-hoc-network routing. Comput. Netw. 55(3), 759–778 (2011)CrossRefGoogle Scholar
  9. 9.
    Veltri, L., Cirani, S., Busanelli, S., Ferrari, G.: A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Netw. 11(8), 2724–2737 (2013)CrossRefGoogle Scholar
  10. 10.
    Doh, I., Lim, J., Chae, K.: Code updates based on minimal backbone and group key management for secure sensor networks. Math. Comput. Model. 57(11), 2801–2813 (2013)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Tang, S., Xu, L., Liu, N., Huang, X., Ding, J., Yang, Z.: Provably secure group key management approach based upon hyper-sphere. IEEE Trans. Parallel Distrib. Syst. 25(12), 3253–3263 (2014)CrossRefGoogle Scholar
  12. 12.
    Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Dong, Z.: Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans. Inf. Forensics Secur. 10(11), 2352–2364 (2015)CrossRefGoogle Scholar
  13. 13.
    Ganesan, V.C., Periyakaruppan, A., Lavanya, R.: Cost-effective polynomial-based multicast–unicast key distribution framework for secure group communication in IPv6 multicast networks. IET Inf. Secur.  https://doi.org/10.1049/iet-ifs.2015.0398 (2016)
  14. 14.
    Sun, Y., Chen, M., Bacchus, A., Lin, X.: Towards collusion-attack-resilient group key management using one-way function tree. Comput. Netw. 104, 16–26 (2016)CrossRefGoogle Scholar
  15. 15.
    Wang, X., Yang, J., Li, Z., Li, H.: The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP J. Wirel. Commun. Netw. 2014(1), 1–22 (2014)CrossRefGoogle Scholar
  16. 16.
    Nabeel, M., Shang, N., Bertino, E.: Privacy preserving policy-based content sharing in public clouds. IEEE Trans. Knowl. Data Eng. 25(11), 2602–2614 (2013)CrossRefGoogle Scholar
  17. 17.
    Yang, Y., Zheng, X., Liu, X., Zhong, S., Chang, V.: Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system. Future Gener. Comput. Syst.  https://doi.org/10.1016/j.future.2017.06.025 (2017)
  18. 18.
    Sepulveda, J., Flórez, D., Immler, V., Gogniat, G., Sigl, G.: Efficient security zones implementation through hierarchical group key management at NoC-based MPSoCs. Microprocess. Microsyst. 50, 164–174 (2017)CrossRefGoogle Scholar
  19. 19.
    Chen, Y.R., Tzeng, W.G.: Group key management with efficient rekey mechanism: a semi-stateful approach for out-of-synchronized members. Comput. Commun. 98, 31–42 (2017)CrossRefGoogle Scholar
  20. 20.
    Bilal, M., Kang, S.G.: A secure key agreement protocol for dynamic group. Clust. Comput.  https://doi.org/10.1007/s10586-017-0853-0 (2017)
  21. 21.
    Gomathi, K., Parvathavarthini, B., Saravanakumar, C.: An efficient secure group communication in MANET using fuzzy trust based clustering and hierarchical distributed group key management. Wirel. Pers. Commun.  https://doi.org/10.1007/s11277-016-3366-x (2017)
  22. 22.
    Zhong, H., Luo, W., Cui, J.: Multiple multicast group key management for the Internet of People. Concurr. Comput. Pract. Exp.  https://doi.org/10.1002/cpe.3817 (2017)
  23. 23.
  24. 24.
    Sharma, S., Krishna, C.R.: An efficient distributed group key management using hierarchical approach with elliptic curve cryptography. In: IEEE International Conference on Computational Intelligence and Communication Technology (CICT), pp. 687–693 (2015)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Computer ScienceBharathiar UniversityCoimbatoreIndia
  2. 2.Computer Science and EngineeringRajiv Gandhi Institute of TechnologyBangaloreIndia

Personalised recommendations