AudiWFlow: Confidential, collusion-resistant auditing of distributed workflows

被引:1
|
作者
Zhou, Xiaohu [1 ]
Nehme, Antonio [1 ]
Jesus, Vitor [2 ]
Wang, Yonghao [1 ]
Josephs, Mark [1 ]
Mahbub, Khaled [1 ]
Abdallah, Ali [1 ]
机构
[1] Birmingham City Univ, Sch Comp & Digital Technol, Birmingham B4 7XG, W Midlands, England
[2] Aston Univ, Aston Business Sch, Birmingham B4 7ER, W Midlands, England
来源
关键词
Auditing; Distributed workflows; Confidentiality; Blockchains; Smart contracts; CLOUD; BLOCKCHAIN;
D O I
10.1016/j.bcra.2022.100073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We discuss the problem of accountability when multiple parties cooperate towards an end result, such as multiple companies in a supply chain or departments of a government service under different authorities. In cases where a fully trusted central point does not exist, it is difficult to obtain a trusted audit trail of a workflow when each individual participant is unaccountable to all others. We propose AudiWFlow, an auditing architecture that makes participants accountable for their contributions in a distributed workflow. Our scheme provides confidentiality in most cases, collusion detection, and availability of evidence after the workflow terminates. AudiWFlow is based on verifiable secret sharing and real-time peer-to-peer verification of records; it further supports multiple levels of assurance to meet a desired trade-off between the availability of evidence and the overhead resulting from the auditing approach. We propose and evaluate two implementation approaches for AudiWFlow. The first one is fully distributed except for a central auxiliary point that, nevertheless, needs only a low level of trust. The second one is based on smart contracts running on a public blockchain, which is able to remove the need for any central point but requires integration with a blockchain.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Data hiding in curves for collusion-resistant digital fingerprinting
    Gou, HM
    Wu, M
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 51 - 54
  • [42] Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions
    Penna, Paolo
    Ventre, Carmine
    ACM TRANSACTIONS ON COMPUTATION THEORY, 2012, 4 (02)
  • [43] Collusion-resistant video watermarking based on video mosaicing
    Koubaa, M.
    Amar, C. Ben
    Nicolas, H.
    ISM 2006: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2006, : 161 - 166
  • [44] Collusion-resistant dynamic spectrum resource renting and offering mechanism
    Liu, Ying-Ting
    Liu, Xin
    Li, Zan
    Zhang, Hai-Lin
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2011, 41 (05): : 1497 - 1502
  • [45] Collusion-Resistant Jamming for Securing Legacy Clients in Wireless Networks
    Xie, Dianhan
    Mao, Wenguang
    Tang, Aimin
    Wang, Xudong
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (10) : 2264 - 2277
  • [46] Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
    Hiroka, Taiga
    Kitagawa, Fuyuki
    Morimae, Tomoyuki
    Nishimaki, Ryo
    Pal, Tapas
    Yamakawa, Takashi
    ADVANCES IN CRYPTOLOGY, PT III, EUROCRYPT 2024, 2024, 14653 : 434 - 456
  • [47] Collusion-Resistant Query Anonymization for Location-Based Services
    Zhang, Qin
    Lazos, Loukas
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 768 - 774
  • [48] Secure and collusion-resistant data aggregation from convertible tags
    Leontiadis, Iraklis
    Li, Ming
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (01) : 1 - 20
  • [49] Collusion-resistant digital fingerprinting based on residual characters tracking
    Wang Z.-X.
    Wang W.-Z.
    Ge Q.
    Hu H.-P.
    Ruan Jian Xue Bao/Journal of Software, 2011, 22 (08): : 1884 - 1896
  • [50] Secure and collusion-resistant data aggregation from convertible tags
    Iraklis Leontiadis
    Ming Li
    International Journal of Information Security, 2021, 20 : 1 - 20