A Multi-Cast Policy Management Process for Improved Network Security with the Group-Oriented Applications

Authors

  • Nanang Yusroni Universitas Wahid Hasyim, AccountingFaculty of Economy Semarang
  • Dhruv Galgotia Professor, Department of Management, Galgotias University, Greater Noida, Uttar Pradesh,India
  • Aniruddha Bodhankar Department Management, Assistant Professor, Dr.Ambedkar Institute of Management Studies & Research,Nagpur
  • Hendy Tannady Universitas Multimedia Nusantara, Management College name: Faculty of Business, Tangerang
  • H. Mary Henrietta Assistant Professor(SG, Department of Mathematics, Saveetha Engineering College(Autonomous), Chennai,
  • Akash Kumar Bhaga Assistant Professor, School of Engg.&IT ARKA JAIN University, Jamshedpur, Jharkhand, India

Keywords:

Group-oriented communication, Multi-cast policy, Policy management, polynomial, Communication cost, Storage Cost

Abstract

The increased Internet utilization leads to emerging group-basedapplications such as military, healthcare, online collaboration, video conferencing and so. However, in the group-oriented application resources are secured through a constraint network. The promising multi-cast communication group-oriented communication model exhibits reduced bandwidth with the different decentralized group key management such as the decentralized group key framework. In this paper, proposed a Multicast Polynomial Key Distribution Scheme (MPKD)model with acentralized and decentralized key management framework. The proposed MPKD model comprises of the three process such as generation of key, distribution of key and refreshment of key. The proposed MPKD mode uses the logical key tree structure with the computation of the polynomial in the key generation process. The performance analysis is based on the structure protocol with the key distribution in the centralized framework model. The performance of the proposed MPKD model is comparatively examined with the conventional OFT, SKD and MUKD model. The analysis of the results expressed that proposed model ~2% - 4% reduces the communication and storage cost. The storage cost of the existing model exhibits the value of maximal 63 but the proposed MPKD model achieves 34 for the user count of 32. Similarly, the communication and storage cost is minimal for the unicast and multicast communication.

Downloads

Download data is not yet available.

References

Ali, R. F., Dominic, P. D. D., Ali, S. E. A., Rehman, M., & Sohail, A. (2021). Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance to compliance. Applied Sciences, 11(8), 3383.

Blazhevska, K. V. (2022). The Social Security Policy of the Republic of North Macedonia: Reform Process, Opportunities and Perspectives. In Social Security in the Balkans–Volume 2 (pp. 13-33). Brill.

Figueiredo, S. O. D., Sincorá, L. A., Leite, M. C. D. O., & Brandão, M. M. (2021). Determinants of crime control in public security policy management. Revista de Administração Pública, 55, 438-458.

Dong, K., Ali, R. F., Dominic, P. D. D., & Ali, S. E. A. (2021). The effect of organizational information security climate on information security policy compliance: The mediating effect of social bonding towards healthcare nurses. Sustainability, 13(5), 2800.

Lingga, P., Kim, J., Bartolome, J. D. I., & Jeong, J. (2021, October). Automatic Data Model Mapper for Security Policy Translation in Interface to Network Security Functions Framework. In 2021 International Conference on Information and Communication Technology Convergence (ICTC) (pp. 882-887). IEEE.

McLeod, A., & Dolezel, D. (2022). Information security policy non-compliance: Can capitulation theory explain user behaviors?. Computers & Security, 112, 102526.

Wong, W. P., Tan, K. H., Chuah, S. H. W., Tseng, M. L., Wong, K. Y., & Ahmad, S. (2020). Information sharing and the bane of information leakage: a multigroup analysis of contract versus noncontract. Journal of Enterprise Information Management, 34(1), 28-53.

Jaeger, L., Eckhardt, A., & Kroenung, J. (2021). The role of deterrability for the effect of multi-level sanctions on information security policy compliance: Results of a multigroup analysis. Information & Management, 58(3), 103318.

Flores, W. R., Antonsen, E., & Ekstedt, M. (2014). Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Computers & security, 43, 90-110.

Yazdanmehr, A., Wang, J., & Yang, Z. (2020). Peers matter: The moderating role of social influence on information security policy compliance. Information Systems Journal, 30(5), 791-844.

Muller, S. R., & Lind, M. L. (2020). Factors in information assurance professionals' intentions to adhere to information security policies. International Journal of Systems and Software Security and Protection (IJSSSP), 11(1), 17-32.

Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of information systems, 18(2), 106-125.

Chen, X., Wu, D., Chen, L., & Teng, J. K. (2018). Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables. Information & Management, 55(8), 1049-1060.

Chen, X., Wu, D., Chen, L., & Teng, J. K. (2018). Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables. Information & Management, 55(8), 1049-1060.

Alshare, K. A., Lane, P. L., & Lane, M. R. (2018). Information security policy compliance: a higher education case study. Information & Computer Security.

Brown, D. A. (2017). Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies (Doctoral dissertation, Walden University).

Key distribution in MPKD

Downloads

Published

19.12.2022

How to Cite

Yusroni, N. ., Galgotia, D. ., Bodhankar, A. ., Tannady, H. ., Mary Henrietta, H., & Akash Kumar Bhaga. (2022). A Multi-Cast Policy Management Process for Improved Network Security with the Group-Oriented Applications. International Journal of Intelligent Systems and Applications in Engineering, 10(2s), 246 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2393

Issue

Section

Research Article

Most read articles by the same author(s)