Broadcast or multicast is one of the most fundamental
concepts in data communication and distributed cryptography. A
central entity wishes to broadcast a secret data stream to a
dynamically changing privileged subset of recipients in such a
way that non-members of the privileged class cannot learn the
secret. This work presents an Adaptively Secure Broadcast
Algorithm (ASBA) based on threats analytics and case based
reasoning. It defines the security intelligence of an adaptively
secure broadcast comprehensively with a novel concept. It
recommends a set of intelligent model checking moves for the
verification of security intelligence of broadcasting mechanism.
The algorithm is analyzed from the perspectives of security
intelligence, communication complexity, computational
intelligence and efficiency of mechanism. The computational
intelligence is associated with the complexity of broadcast
scheduling, verification of security intelligence of broadcasting
system, key management strategies and payment function
computation. The cost of communication depends on number of
agents and subgroups in the broadcasting group and complexity of
data. The algorithm is applicable to the analysis of intelligent
mechanisms in static and dynamic networks, auction or
combinatorial auction for e-market, digital content distribution
through computational advertising, cloud computing, radio and
digital TV broadcast, SCADA and sensor networks.
Author(s): Sumit Chakraborty
Edition: 1
Publisher: Business Analytics Research Lab India
Year: 2012
Language: English
Commentary: Network security, Threat analytics, Security intelligence
Pages: 9
City: Chennai
The work is organized as follows. Section 1 starts with
introduction, the definition of the problem of adaptively secure
broadcast, research methodology and states contributions. It
reviews existing literature and analyzes the gaps. Section 2
presents adaptively secure broadcast algorithm (ASBA). Section 3
analyzes the algorithm from the perspectives of security
intelligence, computational and communication complexity and
efficiency of mechanism. Section 4 concludes the work.