𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security Intelligence for Broadcast: Algorithmic Complexity

✍ Scribed by Sumit Chakraborty


Publisher
Business Analytics Research Lab India
Year
2012
Tongue
English
Leaves
16
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Abstract: Broadcast or multicast is one of the most fundamental concepts in data communication distributed cryptography. A central entity wishes to broadcast a secret data stream to a dynamically changing privileged subset of recipients in such a way that non-members of the privileged class cannot learn the secret. This work presents an adaptively secure broadcast algorithm (ASBA) based on threats analytics and case based reasoning. It defines the security intelligence of an adaptively secure broadcast comprehensively with a novel concept. It recommends a set of intelligent model checking moves for the verification of security intelligence of broadcasting mechanism. The algorithm is analyzed from the perspectives of security intelligence, communication complexity, computational intelligence and mechanism. The computational intelligence is associated with the complexity of broadcast scheduling, verification of security intelligence of broadcasting system, key management strategies and payment function computation. The cost of communication depends on number of agents and subgroups in the broadcasting group and complexity of data. The algorithm is applicable to both static and dynamic networks.
Keywords: Broadcast, Security intelligence, Model checking, Algorithms, Computational intelligence, Communication complexity
Acknowledgment: The reference of this technical report is TC/SIBMCA/V1.0/15082012. The initial version of the present work was incorporated in the thesis of Sumit Chakraborty, β€œA study of several privacy preserving multi-party negotiation problems with applications to supply chain management” as partial fulfillment of Fellow Programme, Indian Institute of Management Calcutta under the guidance of Prof. Asim Kumar Pal, Management Information Systems in 2007 and a paper was presented at HICSS’2008, Hawaii, USA as β€˜Privacy preserving 1-n-p negotiation protocol’. The application domain of these works was combinatorial reverse auction for e-market. The present work is focused on the development of an algorithm for adaptively secure broadcast on the basis of data communication, algorithmic game theory, information security and privacy.

✦ Table of Contents


The work is organized as follows. Section 1 starts with introduction, the definition of the problem of adaptively secure broadcast, research methodology and states contributions. It reviews existing literature and analyzes the gaps. Section 2 presents adaptively secure broadcast algorithm (ASBA). Section 3 analyzes the algorithm from the perspectives of security intelligence, computational and communication complexity and efficiency of mechanism. Section 4 concludes the paper.


πŸ“œ SIMILAR VOLUMES


Security Intelligence for Broadcast : Th
✍ Sumit Chakraborty πŸ“‚ Library πŸ“… 2012 πŸ› Business Analytics Research Lab India 🌐 English

Broadcast or multicast is one of the most fundamental concepts in data communication and distributed cryptography. A central entity wishes to broadcast a secret data stream to a dynamically changing privileged subset of recipients in such a way that non-members of the privileged class cannot lea

Multimedia Security: Algorithm Developme
✍ Kaiser J. Giri (editor), Shabir Ahmad Parah (editor), Rumaan Bashir (editor), Kh πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<div>This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world,

Multimedia Security: Algorithm Developme
✍ Kaiser J. Giri (editor), Shabir Ahmad Parah (editor), Rumaan Bashir (editor), Kh πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<div>This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary world,

Adaptively Secure Broadcast: Threat Anal
✍ Sumit Chakraborty πŸ“‚ Library πŸ“… 2012 πŸ› Business Analytics Research Lab India 🌐 English

Abstract: This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security

SIVA: Security Intelligence Verification
✍ Sumit Chakraborty πŸ“‚ Library πŸ“… 2014 πŸ› Business Analytics Research Lab India 🌐 English

Abstract The basic objective of SIVA is to verify the security and privacy of location based information and communication services based on collective intelligence. The security intelligence of a location based services should be analyzed through a multi-dimensional view : (P1) topology in terms o