A survey on optimization-based approaches to Dynamic Centralized Group Key management

Authors

  • Le Thi Hoai An
  • Nguyen Thi Tuyet Trinh

DOI:

https://doi.org/10.54654/isj.v3i20.952

Keywords:

Centralized group key management, Rekeying, DC Programming, DCA, combinatorial optimization.

Tóm tắt

Abstract—In secure multicast communication, only authorized group members are able to receive the transmitted data. Key generation, distribution, and management are all carried out by a single entity (called the Key Server) in the centralized system. The main challenges of a dynamic centralized group key management scheme include scalability overhead, rekeying overhead, storage overhead, maintaining forward and backward secrecy, etc. Logical Key Hierarchy (LKH), one of the key management methods, uses a tree structure to manage keys to share with participants. Due to the fact that members may join or exit the group at any time during communication, a crucial problem in centralized group key management (CGKM) is minimizing rekeying costs while maintaining a balanced tree. The majority of CGKM methods effectively update the group key by modifying cryptographic techniques or based on logical/heuristic arguments. One of the efficient approaches is based on an optimization model with the two mentioned important objectives. In this paper, we conduct a survey on optimization-based approaches to dynamic CGKM, which can be divided into two categories based on logical/heuristic arguments and a rigorous mathematical optimization model.

Downloads

Download data is not yet available.

References

D. Wallner, E. Harder, R. Agee et al., “Key management for multicast: Issues and architectures,” RFC 2627, Tech. Rep., 1999.

C. K. Wong, M. Gouda, and S. S. Lam, “Secure group communications using key graphs,” IEEE/ACM transactions on networking, vol. 8, no. 1, pp. 16–30, 2000.

M. J. Moyer, J. Rao, and P. Rohatgi, “Maintaining Balanced Key Trees for Secure Multicast,” Internet Engineering Task Force, Internet-Draft, 1999, 16 pages. [Online]. Available:

https://datatracker.ietf.org/doc/html/draft-irtf-smug-key-tree-balance-00

ISO/IEC:11770-5, “Information technology - Security techniques – Key management - Part 5: Group key management,” 2021.

X. S. Li, Y. R. Yang, M. G. Gouda, and S. S. Lam, “Batch rekeying for secure group communications,” in Proceedings of the 10th international conference on World Wide Web, 2001, pp. 525–534.

L. Morales, I. Sudborough, M. Eltoweissy, and M. Heydari, “Combinatorial optimization of multicast key management,” in Proceedings of the 36th Annual Hawaii International Conference on System Sciences. IEEE, 2003.

W. H. D. Ng, M. Howarth, Z. Sun, and H. Cruickshank, “Dynamic balanced key tree management for secure multicast communications,” IEEE Trans Comput, vol. 56, no. 5, pp. 590–605, 2007.

K. Fukushima, S. Kiyomoto, T. Tanaka, and K. Sakurai, “Optimization of group key management structure with a client join-leave mechanism,” Journal of Information Processing, vol. 16, pp. 130–141, 2008.

P. Vijayakumar, S. Bose, and A. Kannan, “Rotation based secure multicast key management for batch rekeying operations,” Netw Sci, vol. 1, no. 1-4, pp. 39–47, 2012.

D.-H. Je, H.-S. Kim, Y.-H. Choi, and S.-W. Seo, “Dynamic configuration of batch rekeying interval for secure multicast service,” in 2014 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2014, pp. 26–30.

A. T. Sherman and D. A. McGrew, “Key establishment in large dynamic groups using one-way function trees,” IEEE transactions on Software Engineering, vol. 29, no. 5, pp. 444–458, 2003.

J. Goshi and R. E. Ladner, “Algorithms for dynamic multicast key distribution trees,” in Proceedings of the twenty-second annual symposium on Principles of distributed computing, 2003, pp. 243–251.

H. Lu, “A novel high-order tree for secure multicast key management,” IEEE Transactions on Computers, vol. 54, no. 2, pp. 214–224, 2005.

H.-Y. Lin, M.-Y. Hsieh, and K.-C. Li, “The cluster-based key management mechanism with secure data transmissions scheme in wireless sensor networks,” DEStech Transactions on Engineering and Technology Research, AMMA, 2017.

S. H. Islam and G. Biswas, “A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication,” Journal of King Saud University-Computer and Information

Sciences, vol. 29, no. 1, pp. 63–73, 2017.

V. Kumar, R. Kumar, and S. K. Pandey, “A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem,” J King Saud Univ - Comput Inf Sci, vol. 32, no. 9, pp. 1081–1094, 2020.

T. T. T. Nguyen, H. P. H. Luu, and H. A. Le Thi, “Solving a centralized dynamic group key management problem by an optimization approach,” in Modelling, Computation and Optimization in Information Systems and

Management Sciences: Proceedings of the 4th International Conference on Modelling, Computation and Optimization in Information Systems and Management Sciences-MCO 2021 4. Springer, 2022, pp. 375–385.

H. A. Le Thi, T. T. T. Nguyen, and H. P. H. Luu, “A DC programming approach for solving a centralized group key management problem,”

Journal of Combinatorial Optimization, vol. 44, no. 5, pp. 3165–3193, 2022.

H. A. Le Thi and T. T. T. Nguyen, “Solving the problem of batch deletion and insertion members in the logical key hierarchy structure

by a DC programming approach,” arXiv, 2023. [Online]. Available: https://doi.org/10.48550/arXiv.2305.10131

T. Pham Dinh, C. N. Nguyen, and H. A. Le Thi, “An efficient combined DCA and B&B using DC/SDP relaxation for globally solving binary

quadratic programs,” J Glob Optim, vol. 48, no. 4, pp. 595–632, 2010.

T. Pham Dinh and H. A. Le Thi, “Convex analysis approach to DC programming: theory, algorithms and applications,” Acta Math. Vietnam., vol. 22, no. 1, pp. 289–355, 1997.

T. Pham Dinh and H. A. Le Thi, “A DC optimization algorithm for solving the trust-region subproblem,” SIAM J. Optim., vol. 8, no. 2, pp. 476–505, 1998.

H. A. Le Thi and T. Pham Dinh, “The DC (difference of convex functions) programming and DCA revisited with DC models of real

world nonconvex optimization problems,” Ann. Oper. Res., vol. 133, no.1-4, pp. 23–46, 2005.

T. Pham Dinh and H. A. Le Thi, “Recent advances in DC programming and DCA,” Transactions on computational intelligence XIII, pp. 1–37, 2014.

H. A. Le Thi and T. Pham Dinh, “DC programming and DCA: thirty years of developments,” Math. Program., Special Issue dedicated to: DC Programming - Theory, Algorithms and Applications, vol. 169, no. 1,

pp. 5–68, 2018.

Downloads

Abstract views: 209 / PDF downloads: 31

Published

2023-12-29

How to Cite

An, L. T. H., & Trinh, N. T. T. (2023). A survey on optimization-based approaches to Dynamic Centralized Group Key management. Journal of Science and Technology on Information Security, 3(20), 54-62. https://doi.org/10.54654/isj.v3i20.952

Issue

Section

Papers