Skip to main content

Dynamic Access Control for Multi-privileged Group Communications

  • Conference paper
Information and Communications Security (ICICS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3269))

Included in the following conference series:

Abstract

Recently, there is an increase in the number of group communication applications which support multiple service groups of different access privileges. Traditional access control schemes for group applications assume that all the group members have the same access privilege and mostly focus on how to reduce rekeying messages upon user joining and leaving. Relatively little research effort has been spent to address security issues for group communications supporting multiple access privileges. In this paper, we propose a dynamic access control scheme for group communications which support multiple service groups with different access privileges. Our scheme allows dynamic formation of service groups and maintains forward/backward security when users switch service groups.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: issues and architectures. Internet Draft Report, Filename:draft-wallner-keyarch- 01.txt (September 1998)

    Google Scholar 

  2. Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey framework: versatile group key management. IEEE Journal on selected areas in communications 17(9), 1614–1631 (1999)

    Article  Google Scholar 

  3. Canetti, R., Garay, J., Itkis, G., Miccianancio, D., Naor, M., Pinkas, B.: Multicast security: a taxonomy and some efficient constructions. In: Proc. IEEE INFOCOMM 1999, March 1999, vol. 2, pp. 708–716 (1999)

    Google Scholar 

  4. Moyer, M.J., Rao, J.R., Rohatgi, P.: A survey of security issues in multicast communications. IEEE Network 13(6), 12–23 (1999)

    Article  Google Scholar 

  5. Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. IEEE/ACM Trans. on Networking 8, 16–30 (2000)

    Article  Google Scholar 

  6. Trappe, W., Song, J., Poovendran, R., Liu, K.J.R.: Key districution for secure multimedia multicasts via data embedding. In: Proc. IEEE ICASSP 2001, May 2001, pp. 1449–1452 (2001)

    Google Scholar 

  7. Mittra, S.: Iolus: a framework for scalable secure multicasting. In: Proc. ACM SIGCOMM 1997, pp. 277–288 (1997)

    Google Scholar 

  8. Perrig, A., Song, D., Tygar, D.: ELK, a new protocol for efficient large-group key distribution. In: Proc. IEEE Synmposium on Security and Privacy, pp. 247–262 (2001)

    Google Scholar 

  9. Banerjee, S., Bhattacharjee, B.: Scalable secure group communication over IP multicast. JSAC Special Issue on Network Support for Group Communication 20(8), 1511–1527 (2002)

    Google Scholar 

  10. Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1(3), 239–248 (1983)

    Article  Google Scholar 

  11. MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An optimal algorithm for assigning cryptographic keys to access control in a hierarchy. IEEE Transactions on Computers C-34(9), 797–802 (1985)

    Article  Google Scholar 

  12. Sandhu, R.S.: Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters 27(2), 95–98 (1988)

    Article  Google Scholar 

  13. Chick, G.C., Tavares, S.E.: Flexible access control with master keys. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 316–322. Springer, Heidelberg (1990)

    Google Scholar 

  14. Harn, L., Lin, H.Y.: A cryptographic key generation scheme for multi-level data security. Journal of Computer and Security 9(6), 539–546 (1990)

    Article  Google Scholar 

  15. Ohta, K., Okamoto, T., Koyama, K.: Membership authentication for hierarchical multigroup using the extended Fiat-Shamir scheme. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 316–322. Springer, Heidelberg (1991)

    Google Scholar 

  16. Yuan, C., Zhu, B., Su, M., Wang, X., Li, S., Zhong, Y.: Layered access control for MPEG-4 FGS video. In: IEEE Int. Conf. Image Processing (September 2003)

    Google Scholar 

  17. Deng, R.H., Wu, Y., Ma, D.: Securing JPEG 2000 Code-Streams. In: International Workshop on Advanced Developments in Software and Systems Security (December 2003)

    Google Scholar 

  18. Sun, Y., Ray Liu, K.J.: Scalable hierarchical access control in secure group communications. In: Proc. IEEE INFOCOMM 2004 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ma, D., Deng, R.H., Wu, Y., Li, T. (2004). Dynamic Access Control for Multi-privileged Group Communications. In: Lopez, J., Qing, S., Okamoto, E. (eds) Information and Communications Security. ICICS 2004. Lecture Notes in Computer Science, vol 3269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30191-2_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30191-2_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23563-7

  • Online ISBN: 978-3-540-30191-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics