1 / 16

Hierarchical Group Access Control for Secure Multicast Communications

Hierarchical Group Access Control for Secure Multicast Communications. Yan (Lindsay) Sun and K. J. Ray Liu IEEE/ACM Transactions on Networking, Dec. 2007. Presented by Seo Bon Keun , 2008. Contents. Group key management Multi -group key management Formalization Security requirements

hedwig
Download Presentation

Hierarchical Group Access Control for Secure Multicast Communications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hierarchical Group Access Control for Secure Multicast Communications Yan (Lindsay) Sun and K. J. Ray Liu IEEE/ACM Transactions on Networking, Dec. 2007. Presented by Seo Bon Keun, 2008.

  2. Contents • Group key management • Multi-group key management • Formalization • Security requirements • Hierarchical multi-group key management • Key tree • Integrated key graph generation • Evaluation • Conclusion

  3. Group key management • Group access control User Resource Documents Audio clips Movie clips

  4. Multi-group key management(1) User Resource Drama Movie Animation capability SG : Service Group DG : Data Group

  5. Multi-group key management (2) • Security requirements • If a user leaves a group and joins other group, • Forward secrecy • cannot access the future content of the resources they leave • Backward secrecy • cannot access the previous content of the resources they join User Resource Forward secrecy Backward secrecy

  6. Hierarchical multi-group key management • Key tree KDC knows : every keys User 1 knows : u1, K00, K0, Ke, KS Key Update Message KS’ KS u6(K10’) K10’(K1’), K11(K1’) K1’(Ke’), K0(Ke’) Ke’(KS’) Ke Ke’ Ke’ K0 K0 K1’ K1 K1’ K00 K01 K10 K10’ K10’ K11 K11 u1 u2 u3 u4 u5 u6 u6 u7 u8

  7. Hierarchical multi-group key management • Integrated key graph SG1 SG2 SK1 SK3 SK2 u1 u1 u2 u5 u6 u3 u4 u7 u8 KD3 KD3 KS1 KS1 KS2 DG1 DG3 DG2 K0 K0 K1 K2 K3 u1 u1 u2 u3 u4 u5 u6 u7 u8

  8. Hierarchical multi-group key management • Integrated key graph generation • Generate subtree for each SG • Generate subtree for each DG • Merge two subtrees SG1 SG2 u1 u2 u5 u6 u3 u4 u7 u8 KS1 KS2 DG1 DG3 DG2 K0 K1 K2 K3 u1 u2 u3 u4 u5 u6 u7 u8

  9. Hierarchical multi-group key management • Integrated key graph generation • Generate subtree for each SG • Generate subtree for each DG • Merge two subtrees SG1 SG2 u1 u2 u5 u6 u3 u4 u7 u8 SK1 SK2 SK3 DG1 DG3 DG2 KD1 KD2 KD3 KS1 KS2 KS1 KS2

  10. Hierarchical multi-group key management • Integrated key graph generation • Generate subtree for each SG • Generate subtree for each DG • Merge two subtrees SK1 SK3 SK2 KD1 KD3 KD2 KS1 KS2 K0 K1 K2 K3 u1 u2 u3 u4 u5 u6 u7 u8

  11. Evaluation • Storage overhead • Rekey overhead Independent tree Multi-group tree d : tree depth / M : the number of trees / n : the number of users Independent tree Multi-group tree d : tree depth / j : the number of involved trees / n : the number of users

  12. Evaluation : simulation • Simulation configuration • Markov chain model

  13. Evaluation • Group size vs. Storage overhead KDC User

  14. Evaluation • Group size vs. Rekey overhead KDC User

  15. Evaluation • Scalability Storage overhead Rekey overhead

  16. Conclusion • A multi-group key management scheme • that achieves hierarchical group access control • Efficient w.r.t • Storage overhead • Communicational cost • Scalability • Evaluation • Concrete by formalization • Confusing denotations

More Related