Advertisement

Dynamic Access Control for Multi-privileged Group Communications

  • Di Ma
  • Robert H. Deng
  • Yongdong Wu
  • Tieyan Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3269)

Abstract

Recently, there is an increase in the number of group communication applications which support multiple service groups of different access privileges. Traditional access control schemes for group applications assume that all the group members have the same access privilege and mostly focus on how to reduce rekeying messages upon user joining and leaving. Relatively little research effort has been spent to address security issues for group communications supporting multiple access privileges. In this paper, we propose a dynamic access control scheme for group communications which support multiple service groups with different access privileges. Our scheme allows dynamic formation of service groups and maintains forward/backward security when users switch service groups.

Keywords

Access Control Group Communication Scalable Video Code Service Group Access Privilege 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: issues and architectures. Internet Draft Report, Filename:draft-wallner-keyarch- 01.txt (September 1998)Google Scholar
  2. 2.
    Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey framework: versatile group key management. IEEE Journal on selected areas in communications 17(9), 1614–1631 (1999)CrossRefGoogle Scholar
  3. 3.
    Canetti, R., Garay, J., Itkis, G., Miccianancio, D., Naor, M., Pinkas, B.: Multicast security: a taxonomy and some efficient constructions. In: Proc. IEEE INFOCOMM 1999, March 1999, vol. 2, pp. 708–716 (1999)Google Scholar
  4. 4.
    Moyer, M.J., Rao, J.R., Rohatgi, P.: A survey of security issues in multicast communications. IEEE Network 13(6), 12–23 (1999)CrossRefGoogle Scholar
  5. 5.
    Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. IEEE/ACM Trans. on Networking 8, 16–30 (2000)CrossRefGoogle Scholar
  6. 6.
    Trappe, W., Song, J., Poovendran, R., Liu, K.J.R.: Key districution for secure multimedia multicasts via data embedding. In: Proc. IEEE ICASSP 2001, May 2001, pp. 1449–1452 (2001)Google Scholar
  7. 7.
    Mittra, S.: Iolus: a framework for scalable secure multicasting. In: Proc. ACM SIGCOMM 1997, pp. 277–288 (1997)Google Scholar
  8. 8.
    Perrig, A., Song, D., Tygar, D.: ELK, a new protocol for efficient large-group key distribution. In: Proc. IEEE Synmposium on Security and Privacy, pp. 247–262 (2001)Google Scholar
  9. 9.
    Banerjee, S., Bhattacharjee, B.: Scalable secure group communication over IP multicast. JSAC Special Issue on Network Support for Group Communication 20(8), 1511–1527 (2002)Google Scholar
  10. 10.
    Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1(3), 239–248 (1983)CrossRefGoogle Scholar
  11. 11.
    MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An optimal algorithm for assigning cryptographic keys to access control in a hierarchy. IEEE Transactions on Computers C-34(9), 797–802 (1985)CrossRefGoogle Scholar
  12. 12.
    Sandhu, R.S.: Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters 27(2), 95–98 (1988)CrossRefGoogle Scholar
  13. 13.
    Chick, G.C., Tavares, S.E.: Flexible access control with master keys. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 316–322. Springer, Heidelberg (1990)Google Scholar
  14. 14.
    Harn, L., Lin, H.Y.: A cryptographic key generation scheme for multi-level data security. Journal of Computer and Security 9(6), 539–546 (1990)CrossRefGoogle Scholar
  15. 15.
    Ohta, K., Okamoto, T., Koyama, K.: Membership authentication for hierarchical multigroup using the extended Fiat-Shamir scheme. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 316–322. Springer, Heidelberg (1991)Google Scholar
  16. 16.
    Yuan, C., Zhu, B., Su, M., Wang, X., Li, S., Zhong, Y.: Layered access control for MPEG-4 FGS video. In: IEEE Int. Conf. Image Processing (September 2003)Google Scholar
  17. 17.
    Deng, R.H., Wu, Y., Ma, D.: Securing JPEG 2000 Code-Streams. In: International Workshop on Advanced Developments in Software and Systems Security (December 2003)Google Scholar
  18. 18.
    Sun, Y., Ray Liu, K.J.: Scalable hierarchical access control in secure group communications. In: Proc. IEEE INFOCOMM 2004 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Di Ma
    • 1
  • Robert H. Deng
    • 2
  • Yongdong Wu
    • 1
  • Tieyan Li
    • 1
  1. 1.Institute for Infocomm ResearchSingapore
  2. 2.School of Information SystemsSingapore Management UniversitySingapore

Personalised recommendations