Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

被引:0
作者
Sanchez-Artigas, Marc [1 ]
Garcia-Lopez, Pedro [1 ]
机构
[1] Univ Rovira & Virgili, Dept Comp Engn & Math, Catalonia, Spain
来源
DATA MANAGEMENT IN GRID AND PEER-TO-PEER SYSTEMS, PROCEEDINGS | 2009年 / 5697卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users - e.g., by granting access to a resource - is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.
引用
收藏
页码:99 / 111
页数:13
相关论文
共 11 条
  • [1] A novel methodology for constructing secure multipath overlays
    Artigas, MS
    López, PG
    Skarmeta, AFG
    [J]. IEEE INTERNET COMPUTING, 2005, 9 (06) : 50 - 57
  • [2] Secure routing for structured peer-to-peer overlay networks
    Castro, M
    Druschel, P
    Ganesh, A
    Rowstron, A
    Wallach, DS
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, : 299 - 314
  • [3] CRISPO B, 2005, ICPADA 2005, P585
  • [4] GAHENI A, 2008, SECURECOMM 2008, P1
  • [5] Goh E.jin., 2003, PROC NETWORK DISTRIB, P131
  • [6] Kallahalla M, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 2ND USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES (FAST'03), P29
  • [7] Menezes Alfred J., 1997, Handbook of Applied Cryptography
  • [8] Secure content access and replication in pure P2P networks
    Palomar, Esther
    Tapiador, Juan M. E.
    Hernandez-Castro, Julio C.
    Ribagorda, Arturo
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (02) : 266 - 279
  • [9] Byzantine fault tolerant public key authentication in peer-to-peer systems
    Pathak, V
    Iftode, L
    [J]. COMPUTER NETWORKS, 2006, 50 (04) : 579 - 596
  • [10] Threshold cryptography in P2P and MANETs: The case of access control
    Saxena, Nitesh
    Tsudik, Gene
    Yi, Jeong Hyun
    [J]. COMPUTER NETWORKS, 2007, 51 (12) : 3632 - 3649