Steganography-Based Secure Communication

Security and scalability are important issues for secure group communication in a grid environment. Secure communication involves confidentiality and authenticity of the user and the message between group members. To transmit data in a secure way, a secure and authenticated key transfer protocol should be applied. Key transfer protocol needs an entity responsible for user authentication and secures session keys. Recently, many researchers have proposed secure group communication methods based upon various cryptographic techniques. In this paper, we propose a secure key transfer protocol that uses the concepts of soft dipole representation of the image and steganography to establish secure communication between group of authenticated users. Steganography hides the existence of group keys in images. This protocol is more secure as compare to previously proposed encryption based group communication protocols. This protocol uses a centralized entity key management center (KMC). KMC generates the group key using soft dipoles of the images of the group members and broadcast it securely to all the communicating group members.

[1]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[2]  Azman Samsudin,et al.  Group Re-keying Protocol Based on Modular Polynomial Arithmetic Over Galois Field GF(2n) , 2009 .

[3]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[4]  H. Raghav Rao,et al.  Security in grid computing: A review and synthesis , 2008, Decis. Support Syst..

[5]  Hai Jin,et al.  A secure mechanism of group communication for pervasive grid , 2009, Int. J. Ad Hoc Ubiquitous Comput..

[6]  Yvo Desmedt,et al.  A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.

[7]  V. Valli Kumari,et al.  Secure Group Key Distribution Using Hybrid Cryptosystem , 2010, 2010 Second International Conference on Machine Learning and Computing.

[8]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[9]  Yuan-Shun Dai,et al.  Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups , 2007, Future Gener. Comput. Syst..

[10]  John I Yellott,et al.  Dipole statistics of discrete finite images: two visually motivated representation theorems. , 2002, Journal of the Optical Society of America. A, Optics, image science, and vision.

[11]  Hai Jin,et al.  An Authenticated Encryption Mechanism for Secure Group Communication in Grid , 2008, 2008 International Conference on Internet Computing in Science and Engineering.

[12]  Haeryong Park,et al.  Simple ID-Based Key Distribution Scheme , 2010, 2010 Fifth International Conference on Internet and Web Applications and Services.

[13]  Ian T. Foster,et al.  Grid Services for Distributed System Integration , 2002, Computer.

[14]  G. Sivakumar,et al.  EGSI: TGKA Based Security Architecture for Group Communication in Grid , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.

[15]  Ian Foster,et al.  The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.

[16]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[17]  Ian T. Foster,et al.  The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..

[18]  B. B. Amberker,et al.  Dynamic Authenticated Secure Group Communication , 2007 .

[19]  Haiyan Wang,et al.  Grid authentication from identity-based cryptography without random oracles , 2008 .

[20]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[21]  Hai Jin,et al.  A Scalable Service Scheme for Secure Group Communication in Grid , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).