A privacy protection method for P2P-based Web service discovery

被引:0
|
作者
Liu, Kuien [1 ,2 ]
Wang, Qing [2 ]
Han, Jun [1 ,2 ]
Wu, Hu [1 ,2 ]
机构
[1] Chinese Acad Sci, Grad Univ, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Software, Beijing, Peoples R China
关键词
D O I
10.1109/ICEBE.2007.113
中图分类号
F [经济];
学科分类号
02 ;
摘要
Peer-to-Poer based Web service discovery systems have shown the high scalability and availability provided by high connectivity and dynamic accommodation. However, a serious difficulty in concurrent designing of such unauthoritative and decentralized controlled systems is how to deal with the privacy concerns and policy enforcement in such systems which may contain a considerable ratio of dishonest anti unavailable peers. We present a privacy protection method implementing authorization model in the broker peers' platform with the supporting of Web service description composition algorithms and discovery protocols especially designed for privacy policy enforcement in P2P environments. We exploit the statistical stability of a large number of peers and analyze the quantitative result of privacy policies being betrayed and obeyed, as well as how to leverage the privacy assurance and availability to desired levels by adjusting the parameters of composition algorithms.
引用
收藏
页码:551 / +
页数:2
相关论文
共 50 条
  • [41] Scalable web service discovery on P2P overlay network
    Zhou, Gang
    Yu, Jianjun
    Chen, Rui
    Zhang, Hui
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2007, : 122 - +
  • [42] A semantic P2P overlay network for web service discovery
    Bisignano, Mario
    Di Modica, Giuseppe
    Tomarchio, Orazio
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 60 - 66
  • [43] Performance evaluation of notifications in a web services and P2P-based network management overlay
    Marquezan, Clarissa Cassales
    Paula dos Santos, Carlos Raniery
    Salvador, Ewerton Monteiro
    Bosquiroli Almeida, Maria Janilce
    Cechin, Sergio Luis
    Granville, Lisandro Zambenedetti
    [J]. COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 241 - +
  • [44] Composing data-providing web services in P2P-based collaboration environments
    Barhamgi, Mahmoud
    Champin, Pierre-Antoine
    Benslimane, Djamal
    Ouksel, Aris M.
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2007, 4495 : 531 - +
  • [45] P2P-Based Single Sign-On
    Ma, Yong
    Chen, Xuewen
    Li, Ling
    Luo, Yaoming
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 845 - +
  • [46] Technical trends in P2P-based communications
    Sunaga, H
    Hoshiai, T
    Kamei, S
    Kimura, S
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 2831 - 2846
  • [47] QoS-aware service selection in P2P-based business process frameworks
    Yuan, Shuai
    Shen, Jun
    [J]. 9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, : 675 - +
  • [48] A Trusted Infrastructure for P2P-Based Marketplaces
    Dinh, Tien Tuan Anh
    Chothia, Tom
    Ryan, Mark
    [J]. 2009 IEEE NINTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P 2009), 2009, : 151 - 154
  • [49] Efficient search and scheduling in P2P-based media-on-demand streaming service
    Chi, Huicheng
    Zhang, Qian
    Jia, Juncheng
    Shen, Xuemin
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2007, 25 (01) : 119 - 130
  • [50] On the Resilience of P2P-based Botnet Graphs
    Haas, Steffen
    Karuppayah, Shankar
    Manickam, Selvakumar
    Mhlhuser, Tmax
    Fischer, Mathias
    [J]. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 225 - 233