A secure broadcasting cryptosystem and its application to grid computing

Security is one of the major requirements of grid computing. In grid computing environments, it should be guaranteed that efficient and secure authenticated broadcasting technologies have been applied for users and servers. In addition, it should be ensured that resources and data are not provided by an attacker. The main purpose of a broadcasting cryptosystem is to establish a secure communication channel from a sender to a group of legal receivers. Recently, several broadcasting cryptosystems have been proposed based upon various cryptographic techniques. However, many researchers pointed out the several security weaknesses in the many previously proposed broadcasting cryptosystems. This paper proposes a new secure broadcasting cryptosystem that can withstand various security attacks and is applicable to grid computing environment. As a result, the proposed broadcasting cryptosystem not only has advantages of the broadcasting cryptosystem, but also is more secure and practical compared with previous related broadcasting cryptosystems.

[1]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[2]  Heon Young Yeom,et al.  Generalized data retrieval for pyramid-based periodic broadcasting of videos , 2004, Future Gener. Comput. Syst..

[3]  Wen Tao Zhu General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach , 2008, 2008 IEEE International Conference on Communications.

[4]  Wen-Tsuen Chen,et al.  Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..

[5]  Hung-Min Sun Security of broadcasting cryptosystem in computer networks , 1999 .

[6]  Antonio F. Gómez-Skarmeta,et al.  Semantic-based authorization architecture for Grid , 2011, Future Gener. Comput. Syst..

[7]  Sonia Sharama,et al.  Grid Computing , 2004, Lecture Notes in Computer Science.

[8]  Yuh-Min Tseng,et al.  Cryptanalysis of Liaw's broadcasting Cryptosystem , 2001 .

[9]  Hai Jin,et al.  Constructing trusted virtual execution environment in P2P grids , 2010, Future Gener. Comput. Syst..

[10]  Chen Qi,et al.  An Approach on Analyzing Histogram and Selecting Threshold , 2008, 2008 International Conference on Computer Science and Software Engineering.

[11]  Dafang Zhang,et al.  DHT-based lightweight broadcast algorithms in large-scale computing infrastructures , 2010, Future Gener. Comput. Syst..

[12]  Il Seok Ko,et al.  A multilayered digital content distribution using a group-key based on web , 2009, Future Gener. Comput. Syst..

[13]  Alberto Peinado,et al.  Cryptanalysis of Improved Liaw's Broadcasting Cryptosystem , 2006, J. Inf. Sci. Eng..

[14]  Jianhua Li,et al.  Fast file dissemination in peer-to-peer networks with upstream bandwidth constraint , 2010, Future Gener. Comput. Syst..

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[16]  Ruay-Shiung Chang,et al.  A new mechanism for resource monitoring in Grid computing , 2009, Future Gener. Comput. Syst..

[17]  Angelos D. Keromytis,et al.  Anonymity in Wireless Broadcast Networks , 2009, Int. J. Netw. Secur..

[18]  Horng-Twu Liaw Broadcasting cryptosystem in computer networks , 1999 .

[19]  Mahalingam Ramkumar Broadcast Authentication With Preferred Verifiers , 2007, Int. J. Netw. Secur..

[20]  Chin-Chen Chang,et al.  A new key assignment scheme for enforcing complicated access control policies in hierarchy , 2003, Future Gener. Comput. Syst..

[21]  Yong Zhang,et al.  A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.

[22]  Gene Tsudik,et al.  Refinement and extension of encrypted key exchange , 1995, OPSR.

[23]  Jordi Herrera Joancomartí,et al.  JXTA resource access control by means of advertisement encryption , 2010 .

[24]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[25]  Yuan-Shun Dai,et al.  Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups , 2007, Future Gener. Comput. Syst..

[26]  C. Sanges,et al.  An optimized broadcasting technique for WK-recursive topologies , 1990, Future Gener. Comput. Syst..

[27]  Fabio Martinelli,et al.  On usage control for GRID systems , 2010, Future Gener. Comput. Syst..

[28]  Eun-Jun Yoon,et al.  Robust Broadcasting Cryptosystem in Computer Networks , 2009, 2009 Workshops at the Grid and Pervasive Computing Conference.

[29]  Mark Manulis,et al.  Tree-based group key agreement framework for mobile ad-hoc networks , 2007, Future Gener. Comput. Syst..

[30]  Xiaogang Wang,et al.  A potential HTTP-based application-level attack against Tor , 2011, Future Gener. Comput. Syst..

[31]  Mark Manulis,et al.  Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[32]  Cc Chang,et al.  BROADCASTING CRYPTOSYSTEM IN COMPUTER-NETWORKS USING INTERPOLATING POLYNOMIALS , 1991 .

[33]  Wen Tao Zhu,et al.  Security of the redefined Liaw's broadcasting cryptosystem , 2008, Comput. Math. Appl..

[34]  Jean-Paul A. Barthès OMAS - a flexible multi-agent environment for CSCWD , 2011, Future Gener. Comput. Syst..

[35]  Bernd Freisleben,et al.  Secure on-demand grid computing , 2009, Future Gener. Comput. Syst..