首页 > 最新文献

2012 Tenth Annual International Conference on Privacy, Security and Trust最新文献

英文 中文
Service provider authentication assurance 服务提供者身份验证保证
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297941
A. Jøsang, Kent A. Varmedal, C. Rosenberger, R. Kumar
The concept of authentication assurance traditionally refers to the robustness of methods and mechanisms for user authentication, including the robustness of initial registration and provisioning of user credentials, as well as the robustness of mechanisms that enforce user authentication during operation. However, the user is not the only party that needs to be authenticated to ensure security of online transactions. In fact, online service provision always involves two parties, typically the user on the client side and the service provider on the server side, so that mutual authentication between the two sides is required. In contrast to the unilateral focus on user authentication by industry and academia, it is in fact equally important for the user to correctly authenticate the service provider. Unfortunately, little attention is paid to the problem of correctly authentication the service provider. This paper proposes a framework for server and service provider authentication assurance, similarly to frameworks for user authentication assurance that have already been specified, or are currently under development by many national governments.
身份验证保证的概念传统上是指用于用户身份验证的方法和机制的鲁棒性,包括初始注册和用户凭证供应的鲁棒性,以及在操作期间强制用户身份验证的机制的鲁棒性。然而,用户并不是唯一需要进行身份验证以确保在线交易安全的一方。实际上,在线服务的提供总是涉及到双方,通常是客户端的用户和服务器端的服务提供者,因此需要双方进行相互认证。与工业界和学术界片面地关注用户认证相比,用户对服务提供商的正确认证实际上同样重要。不幸的是,很少有人关注正确验证服务提供者的问题。本文提出了一个服务器和服务提供商认证保证框架,类似于许多国家政府已经指定或正在开发的用户认证保证框架。
{"title":"Service provider authentication assurance","authors":"A. Jøsang, Kent A. Varmedal, C. Rosenberger, R. Kumar","doi":"10.1109/PST.2012.6297941","DOIUrl":"https://doi.org/10.1109/PST.2012.6297941","url":null,"abstract":"The concept of authentication assurance traditionally refers to the robustness of methods and mechanisms for user authentication, including the robustness of initial registration and provisioning of user credentials, as well as the robustness of mechanisms that enforce user authentication during operation. However, the user is not the only party that needs to be authenticated to ensure security of online transactions. In fact, online service provision always involves two parties, typically the user on the client side and the service provider on the server side, so that mutual authentication between the two sides is required. In contrast to the unilateral focus on user authentication by industry and academia, it is in fact equally important for the user to correctly authenticate the service provider. Unfortunately, little attention is paid to the problem of correctly authentication the service provider. This paper proposes a framework for server and service provider authentication assurance, similarly to frameworks for user authentication assurance that have already been specified, or are currently under development by many national governments.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131082523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Limiting data collection in application forms: A real-case application of a founding privacy principle 限制申请表格中的数据收集:创始隐私原则的实际应用
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297920
N. Anciaux, Benjamin Nguyen, M. Vazirgiannis
Application forms are often used by companies and administrations to collect personal data about applicants and tailor services to their specific situation. For example, taxes rates, social care, or personal loans, are usually calibrated based on a set of personal data collected through application forms. In the eyes of privacy laws and directives, the set of personal data collected to achieve a service must be restricted to the minimum necessary. This reduces the impact of data breaches both in the interest of service providers and applicants. In this article, we study the problem of limiting data collection in those application forms, used to collect data and subsequently feed decision making processes. In practice, the set of data collected is far excessive because application forms are filled in without any means to know what data will really impact the decision. To overcome this problem, we propose a reverse approach, where the set of strictly required data items to fill in the application form can be computed on the user's side. We formalize the underlying NP Hard optimization problem, propose algorithms to compute a solution, and validate them with experiments. Our proposal leads to a significant reduction of the quantity of personal data filled in application forms while still reaching the same decision.
申请表格通常被公司和行政部门用来收集申请人的个人资料,并根据他们的具体情况定制服务。例如,税率、社会保险或个人贷款,通常是根据通过申请表格收集的一组个人数据来校准的。从隐私法律和指令的角度来看,为实现一项服务而收集的个人数据集必须限制在必要的最低限度。这减少了数据泄露对服务提供商和申请人的影响。在本文中,我们研究了在那些用于收集数据并随后提供决策过程的应用程序中限制数据收集的问题。在实际操作中,由于填写申请表时不知道哪些数据会真正影响决策,因此所收集的数据远远过多。为了克服这个问题,我们提出了一种相反的方法,即可以在用户端计算填写应用程序表单所需的严格要求的数据项集。我们形式化了潜在的NP困难优化问题,提出了计算解决方案的算法,并通过实验验证了它们。我们的建议大大减少了申请表格中填写的个人资料数量,同时仍然达到相同的决定。
{"title":"Limiting data collection in application forms: A real-case application of a founding privacy principle","authors":"N. Anciaux, Benjamin Nguyen, M. Vazirgiannis","doi":"10.1109/PST.2012.6297920","DOIUrl":"https://doi.org/10.1109/PST.2012.6297920","url":null,"abstract":"Application forms are often used by companies and administrations to collect personal data about applicants and tailor services to their specific situation. For example, taxes rates, social care, or personal loans, are usually calibrated based on a set of personal data collected through application forms. In the eyes of privacy laws and directives, the set of personal data collected to achieve a service must be restricted to the minimum necessary. This reduces the impact of data breaches both in the interest of service providers and applicants. In this article, we study the problem of limiting data collection in those application forms, used to collect data and subsequently feed decision making processes. In practice, the set of data collected is far excessive because application forms are filled in without any means to know what data will really impact the decision. To overcome this problem, we propose a reverse approach, where the set of strictly required data items to fill in the application form can be computed on the user's side. We formalize the underlying NP Hard optimization problem, propose algorithms to compute a solution, and validate them with experiments. Our proposal leads to a significant reduction of the quantity of personal data filled in application forms while still reaching the same decision.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129586836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Risk perception of internet-related activities 网络相关活动的风险认知
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297924
D. Leblanc, R. Biddle
When people choose to engage in an online activity, such as doing their banking online, or making a purchase through an online merchant, they are making a trust decision about the supplier and source of the website in question. It appears that a large majority of users commonly place their trust in most, if not all, websites they encounter, and this causes significant security problems. Any solutions proposed to reduce the threat of online attacks must include a consideration of the psychological processes of the end users. This paper presents a study with the aim of understanding users' perceptions of the risks involved in engaging in online interactions. Our main findings suggest that users report higher risks associated with activities that are related to finances, such as online banking and online purchases, but attribute lower risk to online activities that are less financially-related, such as using a search engine or engaging in social networking, which are highly valued targets for attackers.
当人们选择从事一项在线活动时,比如在网上办理银行业务,或者通过网上商家购物,他们是在对相关网站的供应商和来源做出信任决定。似乎大多数用户通常信任他们遇到的大多数(如果不是全部的话)网站,这导致了严重的安全问题。任何旨在减少网络攻击威胁的解决方案都必须考虑到最终用户的心理过程。本文提出了一项研究,旨在了解用户对参与在线互动所涉及的风险的看法。我们的主要发现表明,用户报告与财务相关的活动(如网上银行和网上购物)的风险较高,但与财务无关的在线活动(如使用搜索引擎或参与社交网络)的风险较低,而这些活动是攻击者高度重视的目标。
{"title":"Risk perception of internet-related activities","authors":"D. Leblanc, R. Biddle","doi":"10.1109/PST.2012.6297924","DOIUrl":"https://doi.org/10.1109/PST.2012.6297924","url":null,"abstract":"When people choose to engage in an online activity, such as doing their banking online, or making a purchase through an online merchant, they are making a trust decision about the supplier and source of the website in question. It appears that a large majority of users commonly place their trust in most, if not all, websites they encounter, and this causes significant security problems. Any solutions proposed to reduce the threat of online attacks must include a consideration of the psychological processes of the end users. This paper presents a study with the aim of understanding users' perceptions of the risks involved in engaging in online interactions. Our main findings suggest that users report higher risks associated with activities that are related to finances, such as online banking and online purchases, but attribute lower risk to online activities that are less financially-related, such as using a search engine or engaging in social networking, which are highly valued targets for attackers.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126200318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Secure collaboration in on boarding companies 确保登船公司的合作
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297955
P. Chillakanti
Security issues in collaboration with emphasis on access management continue to be researched extensively as technology innovation allows us to collaborate in many different ways. However, this research delves into a different perspective of collaboration security where dynamic virtual teams are put together when a company A acquires company B. In this context company A brings together people, processes, and Technologies from its organization that have to collaborate with their counterparts in the acquired company. The business goal is to seamlessly integrate the acquired companies people, processes, and technologies. The paper presents the inter-enterprise collaboration focus and discusses the relevant security challenges in on boarding. The concept of self-organization and its application to collaboration security is discussed. The notion of security touch points to deal with access management is presented. Finally the security model for on boarding is discussed where four key concepts of structured organization, security touch points, three C's of collaboration, and community driven access management are discussed.
随着技术创新使我们能够以多种不同的方式进行协作,以访问管理为重点的协作中的安全问题继续得到广泛的研究。然而,本研究深入探讨了协作安全的不同观点,当公司a收购公司b时,动态虚拟团队被放在一起。在这种情况下,公司a将其组织中的人员、流程和技术聚集在一起,这些人员、流程和技术必须与被收购公司中的对应方进行协作。业务目标是无缝地集成被收购公司的人员、流程和技术。本文介绍了企业间协作的重点,并讨论了登录中相关的安全挑战。讨论了自组织的概念及其在协同安全中的应用。提出了处理访问管理的安全接触点的概念。最后讨论了入职的安全模型,其中讨论了结构化组织、安全接触点、协作的3c和社区驱动的访问管理的四个关键概念。
{"title":"Secure collaboration in on boarding companies","authors":"P. Chillakanti","doi":"10.1109/PST.2012.6297955","DOIUrl":"https://doi.org/10.1109/PST.2012.6297955","url":null,"abstract":"Security issues in collaboration with emphasis on access management continue to be researched extensively as technology innovation allows us to collaborate in many different ways. However, this research delves into a different perspective of collaboration security where dynamic virtual teams are put together when a company A acquires company B. In this context company A brings together people, processes, and Technologies from its organization that have to collaborate with their counterparts in the acquired company. The business goal is to seamlessly integrate the acquired companies people, processes, and technologies. The paper presents the inter-enterprise collaboration focus and discusses the relevant security challenges in on boarding. The concept of self-organization and its application to collaboration security is discussed. The notion of security touch points to deal with access management is presented. Finally the security model for on boarding is discussed where four key concepts of structured organization, security touch points, three C's of collaboration, and community driven access management are discussed.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130289800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building robust Reputation Systems for travel-related services 为旅游相关服务建立健全的信誉体系
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297937
Huiying Duan, Peng Yang
There is a serious robust issue of building Reputation Systems for travel-related services, such as hotel, restaurant, etc. This paper proposes an advanced clustering approach, Suspicion Degree Meter (SDM), to rank suspects with respect to manipulative behavior. The detection process proceeds on different layers, review layer, traveller layer and hotel layer. Regarding two types of manipulative behavior, i.e. promoting and demoting manipulation, SDM assigns two real numbers, Suspicion Index for Promoting and Suspicion Index for Demoting, to each object in different layers. Inherent logical implication among different layers is considered to adjust the original value of Suspicion Index. Sets of suspects in different layers are identified. Furthermore, some practical reputation models are proposed to enhance the robustness of Reputation Systems. In the evaluation phase, statistical character of suspects and innocent subpopulation are compared. Some interesting conclusions and phenomena are shown. Meanwhile, by using a proposed reputation-model-comparison approach, Ranking Variation Analysis, all the reputation models are compared in terms of efficiency against manipulation. One of the most significant conclusions is that, although there is not a universal reputation model which fits best for every circumstance, given a set of suspects identified by SDM, local optimization can be achieved.
对于旅游相关服务(如酒店、餐厅等)来说,建立声誉系统是一个非常重要的问题。本文提出了一种先进的聚类方法——怀疑度计(SDM),根据嫌疑人的操纵行为对其进行排序。检测过程在不同的层,审查层,旅行者层和酒店层。对于提升和降级两种操纵行为,SDM为不同层的每个对象分配两个实数,即提升怀疑指数和降级怀疑指数。考虑各层之间的内在逻辑蕴涵,调整怀疑指数的原始值。识别不同层的嫌疑犯组。在此基础上,提出了一些实用的声誉模型来增强声誉系统的鲁棒性。在评价阶段,比较了嫌疑人亚群和无辜亚群的统计特征。本文给出了一些有趣的结论和现象。同时,通过提出的声誉模型比较方法——排名变异分析,比较了所有声誉模型在对抗操纵方面的效率。其中一个最重要的结论是,尽管不存在最适合每种情况的通用声誉模型,但给定SDM识别的一组嫌疑人,可以实现局部优化。
{"title":"Building robust Reputation Systems for travel-related services","authors":"Huiying Duan, Peng Yang","doi":"10.1109/PST.2012.6297937","DOIUrl":"https://doi.org/10.1109/PST.2012.6297937","url":null,"abstract":"There is a serious robust issue of building Reputation Systems for travel-related services, such as hotel, restaurant, etc. This paper proposes an advanced clustering approach, Suspicion Degree Meter (SDM), to rank suspects with respect to manipulative behavior. The detection process proceeds on different layers, review layer, traveller layer and hotel layer. Regarding two types of manipulative behavior, i.e. promoting and demoting manipulation, SDM assigns two real numbers, Suspicion Index for Promoting and Suspicion Index for Demoting, to each object in different layers. Inherent logical implication among different layers is considered to adjust the original value of Suspicion Index. Sets of suspects in different layers are identified. Furthermore, some practical reputation models are proposed to enhance the robustness of Reputation Systems. In the evaluation phase, statistical character of suspects and innocent subpopulation are compared. Some interesting conclusions and phenomena are shown. Meanwhile, by using a proposed reputation-model-comparison approach, Ranking Variation Analysis, all the reputation models are compared in terms of efficiency against manipulation. One of the most significant conclusions is that, although there is not a universal reputation model which fits best for every circumstance, given a set of suspects identified by SDM, local optimization can be achieved.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121979133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Platform for privacy preferences (P3P): Current status and future directions 隐私偏好平台(P3P):现状与未来方向
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297943
Muyiwa Olurin, C. Adams, L. Logrippo
Web sites usually express their privacy practices in natural language text that is often complex, informal and possibly confusing. The platform for Privacy Preference (P3P) has been proposed by W3C as a technology for expressing privacy practices of web sites in precise, machine readable language. This paper provides an account of the current status of research on P3P and proposes directions for future research, together with some possible solutions. Cloud computing (SaaS), anti-phishing, and mobile applications are some of the aspects that we consider. We claim that P3P and P3P-based techniques have considerable potential to be developed beyond their current status. The challenge is to design formalized privacy policy languages that can enable computers to process the privacy practices of web sites. In this way, many privacy issues, such as filtering web sites, combining their policies, etc., will be able to be dealt with automatically by privacy agents.
网站通常以自然语言文本表达其隐私实践,这些文本通常复杂、不正式,甚至可能令人困惑。隐私偏好平台(P3P)是W3C提出的一种技术,用于用精确的、机器可读的语言表达网站的隐私实践。本文介绍了P3P的研究现状,提出了今后的研究方向和可能的解决方案。云计算(SaaS)、反网络钓鱼和移动应用程序是我们考虑的一些方面。我们认为P3P和基于P3P的技术有很大的发展潜力。挑战在于设计出形式化的隐私政策语言,使计算机能够处理网站的隐私实践。这样,许多隐私问题,如过滤网站,合并他们的政策等,将能够由隐私代理自动处理。
{"title":"Platform for privacy preferences (P3P): Current status and future directions","authors":"Muyiwa Olurin, C. Adams, L. Logrippo","doi":"10.1109/PST.2012.6297943","DOIUrl":"https://doi.org/10.1109/PST.2012.6297943","url":null,"abstract":"Web sites usually express their privacy practices in natural language text that is often complex, informal and possibly confusing. The platform for Privacy Preference (P3P) has been proposed by W3C as a technology for expressing privacy practices of web sites in precise, machine readable language. This paper provides an account of the current status of research on P3P and proposes directions for future research, together with some possible solutions. Cloud computing (SaaS), anti-phishing, and mobile applications are some of the aspects that we consider. We claim that P3P and P3P-based techniques have considerable potential to be developed beyond their current status. The challenge is to design formalized privacy policy languages that can enable computers to process the privacy practices of web sites. In this way, many privacy issues, such as filtering web sites, combining their policies, etc., will be able to be dealt with automatically by privacy agents.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122322572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A secure data deduplication framework for cloud environments 云环境下安全的重复数据删除框架
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297923
Fatema Rashid, A. Miri, I. Woungang
Cloud computing has empowered the individual user by providing seemingly unlimited storage space and availability and accessibility of data anytime and anywhere. Cloud service providers are able to maximize data storage space by incorporating data deduplication into cloud storage. Although data deduplication removes data redundancy and data replication, it also introduces major data privacy and security issues for the user. In this paper, a new privacy-preserving framework that addresses this issue is proposed. Our framework uses an efficient deduplication algorithm to divide a given file into smaller units. These units are then encrypted by the user using the combination of a secure hash function and a block encryption algorithm. An index tree of hash values of these units is also generated and encrypted using an asymmetric search encryption scheme by the user. This index tree will enable the cloud service provider to search through the index and return the requested units. We will show that our proposed framework will allow cloud service and storage providers to employ data deduplication techniques without giving them access to either the users' plaintexts or the users' decryption keys.
云计算通过提供看似无限的存储空间以及随时随地的数据可用性和可访问性,增强了个人用户的能力。云服务提供商可以通过将重复数据删除集成到云存储中来最大化数据存储空间。虽然重复数据删除消除了数据冗余和数据复制,但它也给用户带来了主要的数据隐私和安全问题。本文提出了一种新的隐私保护框架来解决这个问题。我们的框架使用高效的重复数据删除算法将给定的文件分成更小的单元。然后,这些单元由用户使用安全哈希函数和块加密算法的组合进行加密。这些单元的哈希值的索引树也由用户生成并使用非对称搜索加密方案进行加密。该索引树将使云服务提供商能够搜索索引并返回所请求的单元。我们将展示我们提出的框架将允许云服务和存储提供商使用重复数据删除技术,而不允许他们访问用户的明文或用户的解密密钥。
{"title":"A secure data deduplication framework for cloud environments","authors":"Fatema Rashid, A. Miri, I. Woungang","doi":"10.1109/PST.2012.6297923","DOIUrl":"https://doi.org/10.1109/PST.2012.6297923","url":null,"abstract":"Cloud computing has empowered the individual user by providing seemingly unlimited storage space and availability and accessibility of data anytime and anywhere. Cloud service providers are able to maximize data storage space by incorporating data deduplication into cloud storage. Although data deduplication removes data redundancy and data replication, it also introduces major data privacy and security issues for the user. In this paper, a new privacy-preserving framework that addresses this issue is proposed. Our framework uses an efficient deduplication algorithm to divide a given file into smaller units. These units are then encrypted by the user using the combination of a secure hash function and a block encryption algorithm. An index tree of hash values of these units is also generated and encrypted using an asymmetric search encryption scheme by the user. This index tree will enable the cloud service provider to search through the index and return the requested units. We will show that our proposed framework will allow cloud service and storage providers to employ data deduplication techniques without giving them access to either the users' plaintexts or the users' decryption keys.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122417920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
DLAS: Data Location Assurance Service for cloud computing environments DLAS:用于云计算环境的数据位置保证服务
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297945
A. Noman, C. Adams
In this paper, we present a Data Location Assurance Service (DLAS) solution for the well-known, honest-but-curious server model of the cloud computing environment; the proposed DLAS solution facilitates cloud users not only to give preferences regarding their data location but also to receive verifiable assurance about their data location from the Cloud Service Provider (CSP). Our proposed DLAS solution is based on cryptographic primitives such as zero knowledge sets protocol and ciphertext-policy attribute based encryption. According to the best of our knowledge, we are the first to propose a solution of this kind.
在本文中,我们提出了一种数据位置保证服务(DLAS)解决方案,用于云计算环境中众所周知的、诚实但好奇的服务器模型;拟议的DLAS解决方案不仅有助于云用户提供有关其数据位置的首选项,而且还可以从云服务提供商(CSP)那里获得关于其数据位置的可验证保证。我们提出的DLAS解决方案基于加密原语,如零知识集协议和基于密文策略属性的加密。据我们所知,我们是第一个提出这种解决办法的。
{"title":"DLAS: Data Location Assurance Service for cloud computing environments","authors":"A. Noman, C. Adams","doi":"10.1109/PST.2012.6297945","DOIUrl":"https://doi.org/10.1109/PST.2012.6297945","url":null,"abstract":"In this paper, we present a Data Location Assurance Service (DLAS) solution for the well-known, honest-but-curious server model of the cloud computing environment; the proposed DLAS solution facilitates cloud users not only to give preferences regarding their data location but also to receive verifiable assurance about their data location from the Cloud Service Provider (CSP). Our proposed DLAS solution is based on cryptographic primitives such as zero knowledge sets protocol and ciphertext-policy attribute based encryption. According to the best of our knowledge, we are the first to propose a solution of this kind.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130935998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks 一种用于无线传感器网络的基于信任的集中式高效路由协议
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297940
Ayman Tajeddine, A. Kayssi, A. Chehab
In this paper, we present CENTER, a CENtralized Trust-based Efficient Routing protocol for wireless sensor networks (WSN). CENTER is a secure and efficient routing protocol that utilizes the powerful sink base station (BS) to identify and ban different types of misbehaving nodes that may interrupt or abuse the functionality of the WSN. In CENTER, the BS periodically accumulates simple local observations of every node and deduces a detailed global view of the network. The BS calculates different quality metrics - namely the maliciousness, cooperation, and compatibility, approximates the battery life, and evaluates the Data Trust and Forwarding Trust values of each node. The BS then uses an effective technique to isolate all “bad” nodes, whether misbehaving or malicious, based on their history. Finally, the BS uses an efficient method to disseminate updated routing information, indicating the uplinks and the next hop downlink for every node. Through its centralized approach, CENTER provides more efficient and secure routing while accounting for the energy-constrained sensor nodes. We present simulation results of CENTER performed using TOSSIM to verify its correctness, security, and reliability.
本文提出了一种用于无线传感器网络(WSN)的基于信任的集中式高效路由协议CENTER。CENTER是一种安全高效的路由协议,它利用强大的sink基站(BS)来识别和禁止可能中断或滥用WSN功能的不同类型的不良行为节点。在CENTER中,BS定期积累每个节点的简单局部观测结果,并推导出详细的网络全局视图。BS计算不同的质量指标-即恶意,合作和兼容性,近似电池寿命,并评估每个节点的数据信任和转发信任值。然后,BS使用一种有效的技术来隔离所有“坏”节点,无论是行为不端的还是恶意的,基于它们的历史。最后,采用一种有效的方法来传播更新的路由信息,为每个节点指明上行链路和下一跳下行链路。通过其集中式方法,CENTER提供了更高效和安全的路由,同时考虑到能量受限的传感器节点。我们给出了使用TOSSIM执行CENTER的仿真结果,以验证其正确性、安全性和可靠性。
{"title":"CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks","authors":"Ayman Tajeddine, A. Kayssi, A. Chehab","doi":"10.1109/PST.2012.6297940","DOIUrl":"https://doi.org/10.1109/PST.2012.6297940","url":null,"abstract":"In this paper, we present CENTER, a CENtralized Trust-based Efficient Routing protocol for wireless sensor networks (WSN). CENTER is a secure and efficient routing protocol that utilizes the powerful sink base station (BS) to identify and ban different types of misbehaving nodes that may interrupt or abuse the functionality of the WSN. In CENTER, the BS periodically accumulates simple local observations of every node and deduces a detailed global view of the network. The BS calculates different quality metrics - namely the maliciousness, cooperation, and compatibility, approximates the battery life, and evaluates the Data Trust and Forwarding Trust values of each node. The BS then uses an effective technique to isolate all “bad” nodes, whether misbehaving or malicious, based on their history. Finally, the BS uses an efficient method to disseminate updated routing information, indicating the uplinks and the next hop downlink for every node. Through its centralized approach, CENTER provides more efficient and secure routing while accounting for the energy-constrained sensor nodes. We present simulation results of CENTER performed using TOSSIM to verify its correctness, security, and reliability.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"696 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Making trusted attribute assertions online with the publish trust framework 使用发布信任框架联机发布可信属性断言
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297933
J. Golbeck, H. Warren, E. Winer
Users are able to arbitrarily make assertions about themselves online. In many spaces, it is valuable to both the users and information consumers that those statements can be validated and trusted. In this paper, we present the Publish Trust Framework. This leverages Semantic Web technologies to add provenance to the attributes a person wants to assert about themselves. That connects the statements back to their sources which are rated according to their trustworthiness. We discuss the structure of the framework, describe a pilot deployment, and present future directions for this research.
用户可以在网上随意对自己做出断言。在许多空间中,验证和信任这些语句对用户和信息消费者都很有价值。在本文中,我们提出了发布信任框架。这利用语义Web技术为人们想要断言的关于自己的属性添加出处。这将陈述与它们的来源联系起来,这些来源是根据它们的可信度进行评级的。我们讨论了框架的结构,描述了一个试点部署,并提出了这项研究的未来方向。
{"title":"Making trusted attribute assertions online with the publish trust framework","authors":"J. Golbeck, H. Warren, E. Winer","doi":"10.1109/PST.2012.6297933","DOIUrl":"https://doi.org/10.1109/PST.2012.6297933","url":null,"abstract":"Users are able to arbitrarily make assertions about themselves online. In many spaces, it is valuable to both the users and information consumers that those statements can be validated and trusted. In this paper, we present the Publish Trust Framework. This leverages Semantic Web technologies to add provenance to the attributes a person wants to assert about themselves. That connects the statements back to their sources which are rated according to their trustworthiness. We discuss the structure of the framework, describe a pilot deployment, and present future directions for this research.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124605148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 Tenth Annual International Conference on Privacy, Security and Trust
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1