Geographic server distribution model for key revocation

被引:6
作者
Misra, Sudip [2 ]
Goswami, Sumit [3 ]
Pathak, Gyan Prakash [3 ]
Shah, Nirav [3 ]
Woungang, Isaac [1 ]
机构
[1] Ryerson Univ, Dept Comp Sci, Toronto, ON M5B 2K3, Canada
[2] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[3] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
Geographic server distribution; Key revocation; Public key infrastructure; Certifying authority; Strongest availability zone; CERTIFICATE REVOCATION; ENCRYPTION;
D O I
10.1007/s11235-009-9254-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Key management is one of the important issues in ensuring the security of network services. The aim of key management is to ensure availability of the keys at both the receiver's and the sender's ends. Key management involves two aspects: key distribution and key revocation. Key distribution involves the distribution of keys to various nodes with secrecy to provide authenticity and privacy. Key revocation involves securely and efficiently managing the information about the keys which have been compromised. This paper presents the geographic server distributed model for key revocation which concerns about the security and performance of the system. The concept presented in this paper is more reliable, faster and scalable than the existing Public Key Infrastructure (PKI) framework in various countries, as it provides optimization of key authentication in a network. It proposes auto-seeking of a geographically distributed certifying authority's key revocation server, which holds the revocation lists by the client, based on the best service availability. The network is divided itself into the strongest availability zones (SAZ), which automatically allows the new receiver to update the address of the authentication server and replace the old address with the new address of the SAZ, in case it moves to another location in the zone, or in case the server becomes unavailable in the same zone. In this way, it reduces the time to gain information about the revocation list and ensures availability and, thus, improvement of the system as a whole. Hence, the proposed system results in scalable, reliable and faster PKI infrastructure and will be attractive for the users who frequently change their location in the network. Our scheme eases out the revocation mechanism and enables key revocation in the legacy systems. It discusses the architecture as well as the performance of our scheme as compared to the existing scheme. However, our scheme does not call for the entire change in PKI, but is compatible with the existing scheme. Our simulations show that the proposed scheme is better for key revocation.
引用
收藏
页码:281 / 295
页数:15
相关论文
共 34 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
[Anonymous], PODC 2003
[3]  
[Anonymous], LNCS
[4]  
[Anonymous], 2007, OPENPGP MESSAGE FORM
[5]   A framework for the revocation of unintended digital signatures initiated by malicious terminals [J].
Berta, IZ ;
Buttyán, L ;
Vajda, I .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) :268-272
[6]  
Boneh D, 2001, USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, P297
[7]  
Chow SSM, 2006, LECT NOTES COMPUT SC, V3958, P508
[8]  
CLIFFORD B, 1994, IEEE COMMUN MAG, V32, P33
[9]  
Cooper D. A., 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), P256, DOI 10.1109/CSAC.1999.816035
[10]   A more efficient use of delta-CRLs [J].
Cooper, DA .
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, :190-202