Affiliation:
1. Netaji Subhas Institute of Technology, India
2. University of Delhi, India
Abstract
Grid environment is a virtual organization with varied resources from different administrative domains; it raises the requirement of a secure and reliable protocol for secure communication among various users and servers. The protocol should guarantee that an attacker or an unidentified resource will not breach or forward the information. For secure communication among members of a grid group, an authenticated message transferring system should be implemented. The key objective of this system is to provide a secure transferring path between a sender and its authenticated group members. In recent times, many researchers have proposed various steganographic techniques for secure message communications. This paper proposes a new secure message broadcasting system to hide the messages in such a way that an attacker cannot sense the existence of messages. In the proposed system, the authors use steganography and image encryption to hide group keys and secret messages using group keys in images for secure message broadcasting. The proposed system can withstand against conspiracy attack, message modification attack and various other security attacks. Thus, the proposed system is secure and reliable for message broadcasting.
Reference25 articles.
1. Secure group communication protocol;M.Bhatia;International Journal of Advanced Engineering Sciences and Technologies,2011
2. Bhatia, M., Muttoo, S. K., & Bhatia, M. P. S. (2012). Steganography based secure communication. Proceedings of the Second International Springer Conference on Soft Computing for Problem Solving (SocProS 2012), India.
3. Bhatia, M., Muttoo, S. K. and Bhatia, M.P.S. (2013a, May). Secure Group Communication with Hidden Group Key. Information Security Journal: A Global Perspective, 22(1), 21-34.
4. Secure Requirement Prioritized Grid Scheduling Model;M.Bhatia;International Journal of Network Security,2013
5. Burmester, M., & Desmedt, Y. G. (1994). A Secure and Efficient Conference Key Distribution System. Proceedings of Eurocrypt ’94 Workshop Advances in Cryptology (pp. 275-286).