AudiWFlow: Confidential, collusion-resistant auditing of distributed workflows

被引:1
|
作者
Zhou, Xiaohu [1 ]
Nehme, Antonio [1 ]
Jesus, Vitor [2 ]
Wang, Yonghao [1 ]
Josephs, Mark [1 ]
Mahbub, Khaled [1 ]
Abdallah, Ali [1 ]
机构
[1] Birmingham City Univ, Sch Comp & Digital Technol, Birmingham B4 7XG, W Midlands, England
[2] Aston Univ, Aston Business Sch, Birmingham B4 7ER, W Midlands, England
来源
关键词
Auditing; Distributed workflows; Confidentiality; Blockchains; Smart contracts; CLOUD; BLOCKCHAIN;
D O I
10.1016/j.bcra.2022.100073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We discuss the problem of accountability when multiple parties cooperate towards an end result, such as multiple companies in a supply chain or departments of a government service under different authorities. In cases where a fully trusted central point does not exist, it is difficult to obtain a trusted audit trail of a workflow when each individual participant is unaccountable to all others. We propose AudiWFlow, an auditing architecture that makes participants accountable for their contributions in a distributed workflow. Our scheme provides confidentiality in most cases, collusion detection, and availability of evidence after the workflow terminates. AudiWFlow is based on verifiable secret sharing and real-time peer-to-peer verification of records; it further supports multiple levels of assurance to meet a desired trade-off between the availability of evidence and the overhead resulting from the auditing approach. We propose and evaluate two implementation approaches for AudiWFlow. The first one is fully distributed except for a central auxiliary point that, nevertheless, needs only a low level of trust. The second one is based on smart contracts running on a public blockchain, which is able to remove the need for any central point but requires integration with a blockchain.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions
    Penna, Paolo
    Ventre, Carmine
    ALGORITHMS - ESA 2008, 2008, 5193 : 708 - +
  • [32] Application of WBE sequence sets to collusion-resistant fingerprinting
    Li, Z
    Trappe, W
    INTERNET MULTIMEDIA MANAGEMENT SYSTEMS V, 2004, 5601 : 145 - 156
  • [33] Bounded Collusion-Resistant Registered Functional Encryption for Circuits
    Zhang, Yijian
    Chen, Jie
    He, Debiao
    Zhang, Yuqing
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT I, 2025, 15484 : 32 - 64
  • [34] Collusion-Resistant Repeated Double Auctions for Cooperative Communications
    Xu, Zichuan
    Liang, Weifa
    9TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2012), 2012, : 443 - 447
  • [35] Collusion-resistant, Incentive-compatible Feedback Payments
    Jurca, Radu
    Faltings, Boi
    EC'07: PROCEEDINGS OF THE EIGHTH ANNUAL CONFERENCE ON ELECTRONIC COMMERCE, 2007, : 200 - 209
  • [36] COLLUSION-RESISTANT VIDEO FINGERPRINTING BASED ON TEMPORAL OSCILLATION
    Lin, Yu-Tzu
    Huang, Chun-Hsiang
    Wu, Ja-Ling
    2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 3128 - 3131
  • [37] An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata
    Peter Kieseberg
    Sebastian Schrittwieser
    Martin Mulazzani
    Isao Echizen
    Edgar Weippl
    Electronic Markets, 2014, 24 : 113 - 124
  • [38] Functional Re-encryption and Collusion-Resistant Obfuscation
    Chandran, Nishanth
    Chase, Melissa
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 404 - 421
  • [39] Collusion-Resistant Mechanisms for Single-Parameter Agents
    Goldberg, Andrew V.
    Hartline, Jason D.
    PROCEEDINGS OF THE SIXTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2005, : 620 - 629
  • [40] Collusion-resistant video fingerprinting for large user group
    He, Shan
    Wu, Min
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (04) : 697 - 709