Font Size: a A A

Research And Application Of Hierarchical Data Processing In Multicast Key Management

Posted on:2009-05-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiFull Text:PDF
GTID:2178360308979371Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the fast development of computer network technology and modern data communication technology, people become more and more depended on internet. Therefore, information security attracts increasing awareness and attention from people. The multimedia streaming network application become possible, because the enrichment of network bandwidth. After adopting multicast technology, it only needs to send the copy of every data pack to a group of computers which is in need of the information. Thus, multicast helps to control network flux and reduces the amount of process. The Security of multicast communication needs to be confidential and identifiable, which could be achieved by cryptology. How to minimize the re-key cost and what kind of structure could realize system efficiency optimization, how to find out an adaptable key management scheme, based on the dynamic environment are questions worth further exploration.The paper elaborates on the theory of hierarchical data processing based on graph, proves the optimization of tree structure, analyzes HDP calculation bound, proves multicast management belongs to problems of HDP, provides the cost analytical model of multicast logical key tree which applies HDPT. Then we apply this cost analytical model to analyze the typical balanced tree and imbalanced tree multicast key management scheme, including the re-key cost deposit cost of the typical LKH,2-3 logical key tree,2-3-4 logical key tree and etc.. Based on the above analysis, the author proposes an improved multicast logical key management scheme termed as L-R logical key tree management scheme. L-R logical key tree management scheme is a kind of imbalanced multicast logical key tree, which is based on periodic re-key, according member nodes'joining and leaving different probability, it employs different multicast key management strategy. The paper provides the design and calculation of the scheme, and realizes it in a simulation. Then the paper analyzes the cost of the scheme, applying the multicast logical key tree cost analysis model which is based on HDPT. By comparing this scheme with the typical LKH one, it shows clearly that the scheme proposed in the paper is of high effect and low cost. Finally, the author presents several possible application fields for HDP in the future.
Keywords/Search Tags:Hierarchical Data Processing, Multicast Logical Key Tree, Periodic Re-key, Re-key Cost, L-R Logical Key Tree
PDF Full Text Request
Related items