1-4hit |
Kazuki YONEYAMA Reo YOSHIDA Yuto KAWAHARA Tetsutaro KOBAYASHI Hitoshi FUJI Tomohide YAMAMOTO
In this paper, we propose the first identity-based dynamic multi-cast key distribution (ID-DMKD) protocol which is secure against maximum exposure of secret information (e.g., secret keys and session-specific randomness). In DMKD protocols, users share a common session key without revealing any information of the session key to the semi-honest server, and can join/leave to/from the group at any time even after establishing the session key. Most of the known DMKD protocols are insecure if some secret information is exposed. Recently, an exposure resilient DMKD protocol was introduced, however, each user must manage his/her certificate by using the public-key infrastructure. We solve this problem by constructing the DMKD protocol authenticated by user's ID (i.e., without certificate). We introduce a formal security definition for ID-DMKD by extending the previous definition for DMKD. We must carefully consider exposure of the server's static secret key in the ID-DMKD setting because exposure of the server's static secret key causes exposure of all users' static secret keys. We prove that our protocol is secure in our security model in the standard model. Another advantage of our protocol is scalability: communication and computation costs of each user are independent from the number of users. Furthermore, we show how to extend our protocol to achieve non-interactive join by using certificateless encryption. Such an extension is useful in applications that the group members frequently change like group chat services.
Haruhi ETO Hirofumi MATSUO Fujio KUROKAWA
Wind power generation occupies an important position as a new non-fossil energy in recent years, and the plant scale has been rapidly expanding as wind-farm. Since they are often built in topographically inconvenient places, the remote monitoring system has been required. Ethernet had been said to be unsuitable to the industrial network, it is one of the strong options because of its low cost and easiness to apply. In this case, it is important to secure the throughput enough for updating the data of numerous wind turbines within a fixed time. In order to achieve this, we adopted User Datagram Protocol/Internet Protocol (UDP/IP) and the multi-thread method to make the overhead of software small as possible. This paper presents the scheme of powerful network using Ethernet with multi-thread and multi-cast. The relation between the number of threads and total throughputs of network is clarified. The design procedure to derive the optimum number of threads is shown. And it is demonstrated that this scheme provide the local network of wind-farm with sufficient performance.
Ken'ichi KAWANISHI Yoshitaka TAKAHASHI Toyofumi TAKENAKA
We propose a traffic measurement system which uses trap and polling methods. To obtain its performance we consider a queueing model with a single server and evaluate a packet delay. In our multi-cast traffic, packets are modeled as a batch with a batch size distribution {gk}. The batch arrival process is observed as two processes on the basis of batch size. For a batch whose size is more than or equal to a threshold L, the batch will be trapped by our traffic measurement system (in queueing model, it will enter a queue immediately after its arrival). For a batch whose size is less than L, it will be observed at a polling cycle T (in queueing model, it will be temporarily stored in a buffer and all these small batches will be cyclically noticed with a cycle T). We analyze this queueing model by a diffusion approximation and compare the packet delay observed by our traffic measurement system with the L=1 original batch arrival model. Evaluating the results of the diffusion approximation, we illustrate that our traffic measurement system has functions not only to give an accurate estimation of the mean waiting time but also reduce the number of measurements by choosing appropriate parameters L and T.
Masato OGUCHI Hitoshi AIDA Tadao SAITO
Distributed shared memory is an attractive option for realizing functionally distributed computing in a wide area distributed environment, because of its simplicity and flexibility in software programming. However, up till now, distributed shared memory has mainly been studied in a local environment. In a widely distributed environment, latency of communication greatly affects system performance. Moreover, bandwidth of networks available in a wide area is dramatically increasing recently. DSM architecture using high performance networks must be different from the case of low speed networks being used. In this paper, distributed shared memory models in a widely distributed environment are discussed and evaluated. First, existing distributed shared memory models are examined: They are shared virtual memory and replicated shared memory. Next, an improved replicated shared memory model, which uses internal machine memory, is proposed. In this model, we assume the existence of a seamless, multi-cast wide area network infrastructure - for example, an ATM network. A prototype of this model using multi-thread programming have been implemented on multi-CPU SPARCstations and an ATM-LAN. These DSM models are compared with SCRAMNetTM, whose mechanism is based on replicated shared memory. Results from this evaluation show the superiority of the replicated shared memory compared to shared virtual memory when the length of the network is large. While replicated shared memory using external memory is influenced by the ratio of local and global accesses, replicated shared memory using internal machine memory is suitable for a wide variety of cases. The replicated shared memory model is considered to be suitable particularly for applications which impose real time operation in a widely distributed environment, since some latency hiding techniques such as context switching or data prefetching are not effective for real time demands.