Secure Pseudonymous Access to Overlay Data Dissemination Network

被引:1
|
作者
Del Grosso, Anna [1 ]
Listanti, Marco [1 ]
Baiocchi, Andrea [1 ]
D'Ambrosio, Matteo [1 ]
机构
[1] Univ Rome Sapienza, INFOCOM Dept, Via Eudossiana, I-1800184 Rome, Italy
来源
关键词
Security; Overlay network; Pseudonyms; QoS;
D O I
10.1007/978-88-470-1818-1_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
New paradigms for the Internet architecture evolution towards a data dissemination-oriented have been largely proposed. Scott Shenker et al. (SIGCOMM 2007) define the basic principles desirable for a dissemination network, but they do not suggest. how to realize them. We introduce the Secure Pseudonymous Access (SPA), an access protocol suitable for every dissemination network. The main goal is to couple QoS constraints in terms of data reliability and secure access with easiness of service use, by removing most of administrative and user initialization burdens. The key issue is the user traceability, i.e. the possibility to tie together (in a provable way) the actions performed by the same user entity, along with pieces of data uploaded into the network to be shared with others. The signalling procedures of SPA are defined and the security issues are discussed; finally we describe a test bed implementation of SPA and give an estimate of procedure complexity.
引用
收藏
页码:31 / 41
页数:11
相关论文
共 50 条
  • [1] Network-Aware Overlay Multicast for Large Data Dissemination
    Lee, Joonbok
    Chon, Kilnam
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2009, E92B (06) : 2263 - 2266
  • [2] Secure Overlay Network Design
    Li (Erran) Li
    Mohammad Mahdian
    Vahab S. Mirrokni
    Algorithmica, 2010, 57 : 82 - 96
  • [3] Secure overlay network design
    Li, Li
    Mahdian, Mohammad
    Mirrokni, Vahab S.
    ALGORITHMIC ASPECTS IN INFORMATION AND MANAGEMENT, PROCEEDINGS, 2006, 4041 : 354 - 366
  • [4] Secure Overlay Network Design
    Li, Li
    Mahdian, Mohammad
    Mirrokni, Vahab S.
    ALGORITHMICA, 2010, 57 (01) : 82 - 96
  • [5] Secure Pseudonymous Channels
    Moedersheim, Sebastian
    Vigano, Luca
    COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 337 - +
  • [6] MeNTor: A wireless-mesh-network-aware data dissemination overlay based on BitTorrent
    Rethfeldt, Michael
    Beichler, Benjamin
    Danielis, Peter
    Uster, Felix
    Haubelt, Christian
    Timmermann, Dirk
    AD HOC NETWORKS, 2018, 79 : 146 - 159
  • [7] Priv: Secure and flexible privileged access dissemination
    Hill, BC
    PROCEEDINGS OF THE TENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA X), 1996, : 1 - 8
  • [8] A Policy Enforcement Framework for Secure Data Dissemination in Vehicular Ad Hoc Network
    Xia, Yingjie
    Liu, Xuejiao
    Ou, Jing
    Chen, Wei
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (12) : 13304 - 13314
  • [9] A Secure IoT Based Wireless Sensor Network Data Aggregation and Dissemination System
    Singh, Charanjeet
    Basha, Syed Asif
    Bhushan, A. Vinay
    Venkatesan, Mithra
    Chaturvedi, Abhay
    Shrivastava, Anurag
    CYBERNETICS AND SYSTEMS, 2023,
  • [10] Secure Overlay Cloud Storage with Access Control and Assured Deletion
    Tang, Yang
    Lee, Patrick P. C.
    Lui, John C. S.
    Perlman, Radia
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) : 903 - 916