skip to main content
research-article

Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems

Authors Info & Claims
Published:25 September 2019Publication History
First page image

References

  1. 1998. In Proceedings of the Conference on Advances in Cryptology (EUROCRYPT’98). Vol. 1403. Helsinki, Finland, 127--144.Google ScholarGoogle Scholar
  2. Ahmed Abdel-Harfez, Ali Miri, and Luiz Orozco-Barbosa. 2007. Authenticated group key agreement protocols for ad hoc wireless networks. Int. J. Netw. Secur. 4 (2007), 90--98.Google ScholarGoogle Scholar
  3. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, and Gene Tsudik. 2004. On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. 7, 3 (Aug. 2004), 457--488.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Daniel Augot, Raghav Bhaskar, Valerie Issarny, and Daniele Sacchetti. 2007. A three round authenticated group key agreement protocol for ad hoc networks. Pervas. Mobile Comput. 3 (2007), 36--52.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Backes, C. Cachin, and A. Oprea. 2005. Lazy revocation in cryptographic file systems. In Proceedings of the 3rd IEEE International Security in Storage Workshop (SISW’05).Google ScholarGoogle Scholar
  6. Dan Boneh, Xavier Boyen, and Eu-Jin Goh. 2005. Hierarchical identity based encryption with constant size ciphertext. In Proceedings of the Conference on Advances in Cryptology (EUROCRYPT’05), Ronald Cramer (Ed.). 440--456.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Mike Burmester and Yvo Desmedt. 1994. A secure and efficient conference key distribution system (extended abstract). In Proceedings of the Conference on Advances in Cryptology (EUROCRYPT’94). Springer, 275--286.Google ScholarGoogle Scholar
  8. Chin-Chen Chang, Hao-Chuan Tsai, Pen-Yi Chang Lijun Chu, Xuefeng Zheng, and Shaojie Wang. 2007. A collaborative conference key agreement scheme by using an intermediary node. In Proceedings of the International Conference on Convergence Information Technology. IEEE, 54--59.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. L. Chaudhry and J. G. C. Templeton. 1983. A First Course in Bulk Queues. Wiley, New York.Google ScholarGoogle Scholar
  10. Jiin-Chiou Cheng and Chi-Sung Laih. 2009. Conference key agreement protocol with non-interactive fault-tolerance over broadcast network. Int. J. Inform. Sec. 8 (2009), 1.Google ScholarGoogle Scholar
  11. Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, and Cheng Guo. 2013. A fault-tolerant group key agreement protocol exploiting dynamic setting. Int. J. Commun. Syst. 26 (2013), 259--275.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Cheong Hyeon Choi. 2013. Adaptation of Weil pairing IBE for secure file sharing. In Proceedings of the 5th International Conference on Advances in Databases, Knowledge, and Data Applications (GlobeNet’13). 59--65.Google ScholarGoogle Scholar
  13. Yu-Fang Chung. 2013. The design of authentication key protocol in certificate-free public key cryptosystem. Security and Communication Networks 7, 11 (2013), 2125--2133. DOI:10.1002/sec.924 (2013).Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Whitfield Diffie, Paul C. van Oorschot, and Michael J. Wiener. 1992. Authentication and authenticated key exchanges. Des. Codes Cryptogr. 2 (1992), 107--125.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Allen B. Downey. 2001. The structural cause of file size distributions. SIGMETRICS Perform. Eval. Rev. 29, 1 (June 2001), 328--329.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Orhan Ermiş, Şerif Bahtiyar, Emin Anarım, and M. Ufuk Çağlayan. 2013. An improved fault-tolerant conference-key agreement protocol with forward secrecy. In Proceedings of the 6th International Conference on Security of Information and Networks (SIN’13). 306--310.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Orhan Ermiş, Şerif Bahtiyar, Emin Anarim, and M. Ufuk Çağlayan. 2017. A comparative study on the scalability of dynamic group key agreement protocols. In Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES’17). 62:1--62:6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Orhan Ermiş, Şerif Bahtiyar, Emin Anarım, and M. Ufuk Çağlayan. 2017. A secure and efficient group key agreement approach for mobile ad hoc networks. Ad Hoc Netw. 67, C (Dec. 2017), 24--39.Google ScholarGoogle Scholar
  19. Orhan Ermis, Serif Bahtiyar, Emin Anarim, and M. Ufuk Caglayan. 2017. A key agreement protocol with partial backward confidentiality. Comput. Netw. 129, Part 1 (2017), 159--177.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Rakesh Chandra Gangwar and Anil K. Sarje. 2006. Secure and efficient dynamic group key agreement protocol for an ad hoc network. In Proceedings of the International Symposium on Ad Hoc and Ubiquitous Computing (ISAUHC’06). IEEE, 56--61.Google ScholarGoogle Scholar
  21. G. Gonçalves, I. Drago, A. P. C. d. Silva, A. B. Vieira, and J. M. Almeida. 2014. Modeling the dropbox client behavior. In Proceedings of the IEEE International Conference on Communications (ICC’14). 1332--1337.Google ScholarGoogle Scholar
  22. K. H. Huang, E. C. Chang, and C. L. Chang. 2013. Secure file sharing scheme for mobile devices. In Proceedings of the 4th International Conference on Networking and Distributed Computing. 82--84.Google ScholarGoogle Scholar
  23. Kuo-Hsuan Huang, Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, and Tzer-Shyong Chen. 2009. A conference key agreement protocol with fault-tolerant capability. Comput. Stand. Interf. 31 (2009), 401--405.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Luan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter Hartel, and Willem Jonker. 2009. Information security applications. In Information Security Applications, Heung Youl Youm and Moti Yung (Eds.). Springer-Verlag, Berlin, 309--323.Google ScholarGoogle Scholar
  25. Ingemar Ingemarsson, Donald T. Tang, and C. K. Wong. 1982. A conference key distribution system. IEEE Trans. Inform. Theor. 28 (1982), 714--719.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Yongdae Kim, Adrian Perrig, and Gene Tsudik. 2004. Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7, 1 (Feb. 2004), 60--96.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Mingchu Li, Xiaodong Xu, Cheng Guo, and Xing Tan. [2016]. AD-ASGKA—Authenticated dynamic protocols for asymmetric group key agreement. Secur. Commun. Netw. 9, 11 (2016), 1340--1352.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Qin Liu, Guojun Wang, and Jie Wu. 2014. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258 (Feb. 2014), 355--370.Google ScholarGoogle Scholar
  29. Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan. 2013. Mona: Secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24, 6 (June 2013), 1182--1191.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. Malarvizhi, J. A. J. Sujana, and T. Revathi. 2014. Secure file sharing using cryptographic techniques in cloud. In Proceedings of the International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE’14). IEEE, 1--6.Google ScholarGoogle Scholar
  31. Toshiko Matsumoto, Takashi Onoyama, and Norihisa Komoda. 2014. Efficient Operational Management of Enterprise File Server with File Size Distribution Model. Springer Netherlands, Dordrecht, 599--609.Google ScholarGoogle Scholar
  32. Michael Mitzenmacher. 2003. Dynamic models for file sizes and double Pareto distributions. Internet Math. 1, 3 (2003), 305--333.Google ScholarGoogle ScholarCross RefCross Ref
  33. T. S. R. Murthy, Sivarama Krishna, and G. V. S Raju. 2012. Interdependent queueing model with varying bulk service. Int. J. Math. Soft Comput. 2, 1 (2012).Google ScholarGoogle ScholarCross RefCross Ref
  34. G. F. Newell. 1966. The M/G/∞ queue. SIAM J. Appl. Math. 14, 1 (1966), 86--88.Google ScholarGoogle ScholarCross RefCross Ref
  35. Anthony J. Saibert. 2018. Archiving: Fundamentals of Storage Technology. Retrieved from: http://siim.org/page/archiving_chapter2.Google ScholarGoogle Scholar
  36. Kunwadee Sripanidkulchai, Bruce Maggs, and Hui Zhang. 2004. An analysis of live streaming workloads on the Internet. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC’04). 41--54.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. V. Sundarapandian. 2009. Queueing Theory. PHI Learning, India. 686--749 pages.Google ScholarGoogle Scholar
  38. Yang Tang, Patrick P. C. Lee, John C. S. Lui, and Radia Perlman. 2012. Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Depend. Secur. Comput. 9, 6 (Nov. 2012), 903--916.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. J. Teng and C. Wu. 2016. An identity-based group key agreement protocol for low-power mobile devices. Chinese J. Electron. 25, 4 (2016), 726--733.Google ScholarGoogle ScholarCross RefCross Ref
  40. Yuh-Min Tseng. 2005. An improved conference-key agreement protocol with forward secrecy. Informatica, Lith. Acad. Sci. 16 (2005), 275--284.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Yuh-Min Tseng. 2007. A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy. J. Syst. Softw. 80 (2007), 1091--1101.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Wen-Guey Tzeng. 2000. A practical and secure fault-tolerant conference-key agreement protocol. In Proceedings of the International Workshop on Public Key Cryptography. Springer, 1--13.Google ScholarGoogle ScholarCross RefCross Ref
  43. Wen-Guey Tzeng. 2002. A secure fault-tolerant conference-key agreement protocol. IEEE Trans. Comput. 51 (2002), 373--379.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. F. Wang, J. Liu, and Y. Xiong. 2008. Stable peers: Existence, importance, and application in peer-to-peer live video streaming. In Proceedings of th 27th Conference on Computer Communications (IEEE INFOCOM’08). 1364--1372.Google ScholarGoogle Scholar
  45. Guojun Wang, Qin Liu, Jie Wu, and Minyi Guo. 2011. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30, 5 (July 2011), 320--331.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Brent Waters. 2011. In Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography(PKC’11). Springer Berlin, 53--70.Google ScholarGoogle Scholar
  47. Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou. 2010. Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS’10). 261--270.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and Z. Dong. 2015. Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans. Inform. Forens. Secur. 10, 11 (2015), 2352--2364.Google ScholarGoogle ScholarCross RefCross Ref
  49. Jianjie Zhao, Dawu Gu, and Yali Li. 2010. An efficient fault-tolerant group key agreement protocol. Comput. Commun. 33 (2010), 890--895.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Zhongma Zhu and Rui Jiang. 2016. A secure anti-collusion data sharing scheme for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 27, 1 (Jan. 2016), 40--50.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Privacy and Security
          ACM Transactions on Privacy and Security  Volume 22, Issue 4
          November 2019
          170 pages
          ISSN:2471-2566
          EISSN:2471-2574
          DOI:10.1145/3364835
          Issue’s Table of Contents

          Copyright © 2019 ACM

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 September 2019
          • Accepted: 1 June 2019
          • Revised: 1 April 2019
          • Received: 1 August 2018
          Published in tops Volume 22, Issue 4

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed
        • Article Metrics

          • Downloads (Last 12 months)14
          • Downloads (Last 6 weeks)1

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!