Skip to main content
Log in

Improved group key management region based cluster protocol in cloud

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Group key management protocol (GKMP) is an emergent protocol for secured group communication services like videoconferencing, video on demand, etc. GKMP provides the creation and distribution of keys within groups. The intervention of a centralized key manager is avoided with this technique. To improve the security in multicast environments, GKMP effectively combines region-clustering approach based on the theory of hyper sphere and re-encryption using projective geometry. This forms a region based cluster protocol. Security is handled in an effective way through digital signature technique namely EdDSA and projective geometry. This paper concentrates on applying the intelligent security algorithm over the group controller in a distributed environment. The comparison with conventional techniques prove that the proposed algorithm outperforms well in terms of improved security and reduced overhead in multicast environments. The region based cluster protocol scheme increases the scalability of GKMP scheme in cloud environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Seba, H.: FTKM: a fault-tolerant key management protocol for multicast communications. Comput. Secur. 25(6), 426–434 (2006)

    Article  Google Scholar 

  2. Augot, D., Bhaskar, R., Issarny, V., Sacchetti, D.: A three round authenticated group key agreement protocol for ad hoc networks. Pervasive Mob. Comput. 3(1), 36–52 (2007)

    Article  Google Scholar 

  3. Pour, A.N., Kumekawa, K., Kato, T., Itoh, S.: A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. Comput. Netw. 51(17), 4727–4743 (2007)

    Article  Google Scholar 

  4. Huang, D., Medhi, D.: A secure group key management scheme for hierarchical mobile ad hoc networks. Ad Hoc Netw. 6(4), 560–577 (2008)

    Article  Google Scholar 

  5. Cho, J.H., Chen, R., Wang, D.C.: Performance optimization of region-based group key management in mobile ad hoc networks. Perform. Eval. 65(5), 319–344 (2008)

    Article  Google Scholar 

  6. Cho, J.H., Chen, R.: Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Perform. Eval. 68(1), 58–75 (2011)

    Article  Google Scholar 

  7. Drira, K., Seba, H., Kheddouci, H.: ECGK: an efficient clustering scheme for group key management in MANETs. Comput. Commun. 33(9), 1094–1107 (2010)

    Article  Google Scholar 

  8. Fernandes, N.C., Duarte, O.C.M.B.: A lightweight group-key management protocol for secure ad-hoc-network routing. Comput. Netw. 55(3), 759–778 (2011)

    Article  Google Scholar 

  9. Veltri, L., Cirani, S., Busanelli, S., Ferrari, G.: A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Netw. 11(8), 2724–2737 (2013)

    Article  Google Scholar 

  10. Doh, I., Lim, J., Chae, K.: Code updates based on minimal backbone and group key management for secure sensor networks. Math. Comput. Model. 57(11), 2801–2813 (2013)

    Article  MathSciNet  Google Scholar 

  11. Tang, S., Xu, L., Liu, N., Huang, X., Ding, J., Yang, Z.: Provably secure group key management approach based upon hyper-sphere. IEEE Trans. Parallel Distrib. Syst. 25(12), 3253–3263 (2014)

    Article  Google Scholar 

  12. Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Dong, Z.: Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans. Inf. Forensics Secur. 10(11), 2352–2364 (2015)

    Article  Google Scholar 

  13. Ganesan, V.C., Periyakaruppan, A., Lavanya, R.: Cost-effective polynomial-based multicast–unicast key distribution framework for secure group communication in IPv6 multicast networks. IET Inf. Secur. https://doi.org/10.1049/iet-ifs.2015.0398 (2016)

  14. Sun, Y., Chen, M., Bacchus, A., Lin, X.: Towards collusion-attack-resilient group key management using one-way function tree. Comput. Netw. 104, 16–26 (2016)

    Article  Google Scholar 

  15. Wang, X., Yang, J., Li, Z., Li, H.: The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP J. Wirel. Commun. Netw. 2014(1), 1–22 (2014)

    Article  Google Scholar 

  16. Nabeel, M., Shang, N., Bertino, E.: Privacy preserving policy-based content sharing in public clouds. IEEE Trans. Knowl. Data Eng. 25(11), 2602–2614 (2013)

    Article  Google Scholar 

  17. Yang, Y., Zheng, X., Liu, X., Zhong, S., Chang, V.: Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system. Future Gener. Comput. Syst. https://doi.org/10.1016/j.future.2017.06.025 (2017)

  18. Sepulveda, J., Flórez, D., Immler, V., Gogniat, G., Sigl, G.: Efficient security zones implementation through hierarchical group key management at NoC-based MPSoCs. Microprocess. Microsyst. 50, 164–174 (2017)

    Article  Google Scholar 

  19. Chen, Y.R., Tzeng, W.G.: Group key management with efficient rekey mechanism: a semi-stateful approach for out-of-synchronized members. Comput. Commun. 98, 31–42 (2017)

    Article  Google Scholar 

  20. Bilal, M., Kang, S.G.: A secure key agreement protocol for dynamic group. Clust. Comput. https://doi.org/10.1007/s10586-017-0853-0 (2017)

  21. Gomathi, K., Parvathavarthini, B., Saravanakumar, C.: An efficient secure group communication in MANET using fuzzy trust based clustering and hierarchical distributed group key management. Wirel. Pers. Commun. https://doi.org/10.1007/s11277-016-3366-x (2017)

  22. Zhong, H., Luo, W., Cui, J.: Multiple multicast group key management for the Internet of People. Concurr. Comput. Pract. Exp. https://doi.org/10.1002/cpe.3817 (2017)

  23. EdDSA. https://tools.ietf.org/pdf/rfc8032.pdf

  24. Sharma, S., Krishna, C.R.: An efficient distributed group key management using hierarchical approach with elliptic curve cryptography. In: IEEE International Conference on Computational Intelligence and Communication Technology (CICT), pp. 687–693 (2015)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Umi Salma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Salma, B.U., Lawrence, A.A. Improved group key management region based cluster protocol in cloud. Cluster Comput 22 (Suppl 5), 11699–11711 (2019). https://doi.org/10.1007/s10586-017-1455-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1455-6

Keywords

Navigation