首页 > 最新文献

Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society最新文献

英文 中文
Preserving confidentiality of security policies in data outsourcing 在数据外包中保持安全策略的机密性
S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, Gerardo Pelosi, P. Samarati
Recent approaches for protecting information in data outsourcing scenarios exploit the combined use of access control and cryptography. In this context, the number of keys to be distributed and managed by users can be maintained limited by using a public catalog of tokens that allow key derivation along a hierarchy. However, the public token catalog, by expressing the key derivation relationships, may leak information on the security policies (authorizations) enforced by the system, which the data owner may instead wish to maintain confidential. In this paper, we present an approach to protect the privacy of the tokens published in the public catalog. Consistently with the data outsourcing scenario, our solution exploits the use of cryptography, by adding an encryption layer to the catalog. A complicating issue in this respect is that this new encryption layer should follow a derivation path that is "reversed" with respect to the key derivation. Our approach solves this problem by combining cryptography and transitive closure information. The result is an efficient solution allowing token release and traversal of the key derivation structure only to those users authorized to access the underlying resources. We also present experimental results that illustrate the behavior of our technique in large settings.
在数据外包场景中保护信息的最新方法是结合使用访问控制和加密技术。在这种情况下,可以通过使用允许沿层次结构派生密钥的令牌公共目录来限制用户分发和管理的密钥数量。然而,通过表示密钥派生关系,公共令牌目录可能会泄露有关系统强制执行的安全策略(授权)的信息,而数据所有者可能希望对这些信息保密。在本文中,我们提出了一种保护在公共目录中发布的令牌的隐私的方法。与数据外包场景一致,我们的解决方案通过向目录添加加密层来利用加密技术的使用。这方面的一个复杂问题是,这个新的加密层应该遵循与密钥派生“相反”的派生路径。我们的方法通过结合密码学和传递闭包信息解决了这个问题。其结果是一个有效的解决方案,仅允许授权访问底层资源的用户释放令牌和遍历密钥派生结构。我们还提出了实验结果,说明了我们的技术在大型设置中的行为。
{"title":"Preserving confidentiality of security policies in data outsourcing","authors":"S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, Gerardo Pelosi, P. Samarati","doi":"10.1145/1456403.1456417","DOIUrl":"https://doi.org/10.1145/1456403.1456417","url":null,"abstract":"Recent approaches for protecting information in data outsourcing scenarios exploit the combined use of access control and cryptography. In this context, the number of keys to be distributed and managed by users can be maintained limited by using a public catalog of tokens that allow key derivation along a hierarchy. However, the public token catalog, by expressing the key derivation relationships, may leak information on the security policies (authorizations) enforced by the system, which the data owner may instead wish to maintain confidential.\u0000 In this paper, we present an approach to protect the privacy of the tokens published in the public catalog. Consistently with the data outsourcing scenario, our solution exploits the use of cryptography, by adding an encryption layer to the catalog. A complicating issue in this respect is that this new encryption layer should follow a derivation path that is \"reversed\" with respect to the key derivation. Our approach solves this problem by combining cryptography and transitive closure information. The result is an efficient solution allowing token release and traversal of the key derivation structure only to those users authorized to access the underlying resources. We also present experimental results that illustrate the behavior of our technique in large settings.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"135 1","pages":"75-84"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75636802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Secure aggregation in a publish-subscribe system 发布-订阅系统中的安全聚合
Kazuhiro Minami, Adam J. Lee, M. Winslett, N. Borisov
A publish-subscribe system is an information dissemination infrastructure that supports many-to-many communications among publishers and subscribers. In many publish-subscribe systems, in-network aggregation of input data is considered to be an important service that reduces the bandwidth requirements of the system significantly. In this paper, we present a scheme for securing the aggregation of inputs to such a publish-subscribe system. Our scheme, which focuses on the additive aggregate function, sum, preserves the confidentiality and integrity of aggregated data in the presence of untrusted routing nodes. Our scheme allows a group of publishers to publish aggregate data to authorized subscribers without revealing their individual private inputs to either the routing nodes or the subscribers. In addition, our scheme allows subscribers to verify that routing nodes perform the aggregation operation correctly. We use a message authentication code (MAC) scheme based on the discrete logarithm property to allow subscribers to verify the correctness of aggregated data without receiving the digitally-signed raw data used as input to the aggregation. In addition to describing our secure aggregation scheme, we provide formal proofs of its soundness and safety.
发布-订阅系统是一种支持发布者和订阅者之间多对多通信的信息传播基础设施。在许多发布-订阅系统中,输入数据的网络内聚合被认为是一项重要的服务,它可以显著降低系统的带宽需求。在本文中,我们提出了一种保护这种发布-订阅系统的输入聚合的方案。该方案着重于累加聚合函数sum,在存在不可信路由节点的情况下保持聚合数据的机密性和完整性。我们的方案允许一组发布者向授权的订阅者发布聚合数据,而无需向路由节点或订阅者透露其个人私有输入。此外,我们的方案允许订阅者验证路由节点是否正确地执行聚合操作。我们使用基于离散对数属性的消息验证码(MAC)方案,允许订阅者验证聚合数据的正确性,而无需接收用作聚合输入的经过数字签名的原始数据。除了描述我们的安全聚合方案外,我们还提供了其可靠性和安全性的正式证明。
{"title":"Secure aggregation in a publish-subscribe system","authors":"Kazuhiro Minami, Adam J. Lee, M. Winslett, N. Borisov","doi":"10.1145/1456403.1456419","DOIUrl":"https://doi.org/10.1145/1456403.1456419","url":null,"abstract":"A publish-subscribe system is an information dissemination infrastructure that supports many-to-many communications among publishers and subscribers. In many publish-subscribe systems, in-network aggregation of input data is considered to be an important service that reduces the bandwidth requirements of the system significantly. In this paper, we present a scheme for securing the aggregation of inputs to such a publish-subscribe system. Our scheme, which focuses on the additive aggregate function, sum, preserves the confidentiality and integrity of aggregated data in the presence of untrusted routing nodes. Our scheme allows a group of publishers to publish aggregate data to authorized subscribers without revealing their individual private inputs to either the routing nodes or the subscribers. In addition, our scheme allows subscribers to verify that routing nodes perform the aggregation operation correctly. We use a message authentication code (MAC) scheme based on the discrete logarithm property to allow subscribers to verify the correctness of aggregated data without receiving the digitally-signed raw data used as input to the aggregation. In addition to describing our secure aggregation scheme, we provide formal proofs of its soundness and safety.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"23 1","pages":"95-104"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81052654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Protecting privacy with protocol stack virtualization 使用协议栈虚拟化保护隐私
J. Lindqvist, J. Tapio
Previously proposed host-based privacy protection mechanisms use pseudorandom or disposable identifiers on some or all layers of the protocol stack. These approaches either require changes to all hosts participating in the communication or do not provide privacy for the whole protocol stack or the system. Building on previous work, we propose a relatively simple approach: protocol stack virtualization. The key idea is to provide isolation for traffic sent to the network. The granularity of the isolation can be, for example, flow or process based. With process based granularity, every application uses a distinct identifier space on all layers of the protocol stack. This approach does not need any infrastructure support from the network and requires only minor changes to the single host that implements the privacy protection mechanism. To show that no changes to typical applications are required, we implemented the protocol stack virtualization as a user space daemon and tested it with various legacy applications.
以前提出的基于主机的隐私保护机制在协议栈的某些或所有层上使用伪随机或一次性标识符。这些方法要么需要对参与通信的所有主机进行更改,要么不为整个协议栈或系统提供隐私。在之前工作的基础上,我们提出了一种相对简单的方法:协议栈虚拟化。其关键思想是为发送到网络的流量提供隔离。例如,隔离的粒度可以是基于流或流程的。使用基于进程的粒度,每个应用程序在协议栈的所有层上使用不同的标识符空间。这种方法不需要网络的任何基础设施支持,只需要对实现隐私保护机制的单个主机进行微小的更改。为了证明不需要对典型应用程序进行任何更改,我们将协议栈虚拟化实现为用户空间守护进程,并使用各种遗留应用程序对其进行了测试。
{"title":"Protecting privacy with protocol stack virtualization","authors":"J. Lindqvist, J. Tapio","doi":"10.1145/1456403.1456416","DOIUrl":"https://doi.org/10.1145/1456403.1456416","url":null,"abstract":"Previously proposed host-based privacy protection mechanisms use pseudorandom or disposable identifiers on some or all layers of the protocol stack. These approaches either require changes to all hosts participating in the communication or do not provide privacy for the whole protocol stack or the system. Building on previous work, we propose a relatively simple approach: protocol stack virtualization. The key idea is to provide isolation for traffic sent to the network. The granularity of the isolation can be, for example, flow or process based. With process based granularity, every application uses a distinct identifier space on all layers of the protocol stack. This approach does not need any infrastructure support from the network and requires only minor changes to the single host that implements the privacy protection mechanism. To show that no changes to typical applications are required, we implemented the protocol stack virtualization as a user space daemon and tested it with various legacy applications.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"231 1","pages":"65-74"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79127391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Privacy-preserving social network analysis for criminal investigations 为刑事调查保护隐私的社会网络分析
F. Kerschbaum, A. Schaad
Social network analysis (SNA) is now a commonly used tool in criminal investigations, but evidence gathering and analysis is often restricted by data privacy laws. We consider the case where multiple investigators want to collaborate, but do not yet have sufficient evidence that justifies a plaintext data exchange. This paper proposes a solution for privacy-preserving social network analysis where several investigators can collaborate without actually exchanging sensitive private information. An investigator can request data from other sites to augment his view without revealing personally identifiable data. The investigator can compute important metrics by means of a SNA on the subject while keeping the entire social network unknown him.
社交网络分析(SNA)现在是刑事调查中常用的工具,但证据收集和分析往往受到数据隐私法的限制。我们考虑多个调查人员想要合作的情况,但还没有足够的证据证明明文数据交换是合理的。本文提出了一种保护隐私的社交网络分析解决方案,其中多个调查人员可以在不实际交换敏感隐私信息的情况下进行协作。调查人员可以从其他网站请求数据来增强他的观点,而不会泄露个人身份数据。研究者可以在保持整个社会网络不为人知的情况下,通过SNA计算出重要的指标。
{"title":"Privacy-preserving social network analysis for criminal investigations","authors":"F. Kerschbaum, A. Schaad","doi":"10.1145/1456403.1456406","DOIUrl":"https://doi.org/10.1145/1456403.1456406","url":null,"abstract":"Social network analysis (SNA) is now a commonly used tool in criminal investigations, but evidence gathering and analysis is often restricted by data privacy laws. We consider the case where multiple investigators want to collaborate, but do not yet have sufficient evidence that justifies a plaintext data exchange. This paper proposes a solution for privacy-preserving social network analysis where several investigators can collaborate without actually exchanging sensitive private information. An investigator can request data from other sites to augment his view without revealing personally identifiable data. The investigator can compute important metrics by means of a SNA on the subject while keeping the entire social network unknown him.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"22 1","pages":"9-14"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73848828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
TwoKind authentication: protecting private information in untrustworthy environments 两种认证:在不可信的环境中保护私有信息
Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith
Users often log in to Internet sites from insecure computers and more recently have started divulging their email passwords to social-networking sites, thereby putting their private communications at risk. We propose and evaluate TwoKind Authentication, a simple and effective technique for limiting access to private information in untrustworthy environments. In its simplest form, TwoKind offers two modes of authentication by providing a low and a high authenticator. By using a low authenticator, users can signal to the server that they are in an untrusted environment, following which the server restricts the user's actions. We seek to evaluate the effectiveness of multiple authenticators in promoting safer behavior in users. We demonstrate the effectiveness of this approach through a user experiment - we find that users make a distinction between the two authenticators and generally behave in a security-conscious way, protecting their high authenticator the ma jority of the time. Our study suggests that TwoKind will be beneficial to several Internet applications, particularly if the privileges associated with the low authenticator can be customized to a user's security preferences.
用户经常使用不安全的电脑登录互联网网站,最近开始向社交网站泄露他们的电子邮件密码,从而使他们的私人通信处于危险之中。我们提出并评估了两种身份验证,这是一种简单有效的技术,用于限制在不可信的环境中访问私人信息。在其最简单的形式中,TwoKind通过提供低身份验证器和高身份验证器提供了两种身份验证模式。通过使用低身份验证器,用户可以向服务器发出信号,表明他们处于不受信任的环境中,然后服务器限制用户的操作。我们试图评估多个认证器在促进用户更安全行为方面的有效性。我们通过用户实验证明了这种方法的有效性——我们发现用户区分了两个身份验证者,并且通常以安全意识的方式行事,大多数时候保护他们的高级身份验证者。我们的研究表明,TwoKind将对几个互联网应用程序有益,特别是如果与低身份验证器相关的特权可以根据用户的安全偏好进行定制。
{"title":"TwoKind authentication: protecting private information in untrustworthy environments","authors":"Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith","doi":"10.1145/1456403.1456412","DOIUrl":"https://doi.org/10.1145/1456403.1456412","url":null,"abstract":"Users often log in to Internet sites from insecure computers and more recently have started divulging their email passwords to social-networking sites, thereby putting their private communications at risk. We propose and evaluate TwoKind Authentication, a simple and effective technique for limiting access to private information in untrustworthy environments. In its simplest form, TwoKind offers two modes of authentication by providing a low and a high authenticator. By using a low authenticator, users can signal to the server that they are in an untrusted environment, following which the server restricts the user's actions.\u0000 We seek to evaluate the effectiveness of multiple authenticators in promoting safer behavior in users. We demonstrate the effectiveness of this approach through a user experiment - we find that users make a distinction between the two authenticators and generally behave in a security-conscious way, protecting their high authenticator the ma jority of the time. Our study suggests that TwoKind will be beneficial to several Internet applications, particularly if the privileges associated with the low authenticator can be customized to a user's security preferences.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"7 1","pages":"39-44"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88430790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Avoiding information leakage in security-policy-aware planning 在安全策略规划中避免信息泄露
Keith Irwin, Ting Yu, W. Winsborough
In early computer systems only simple actions would be governed by security policies. However, computers are increasingly handling complex organizational tasks which may have complex preconditions and postconditions. As such, it is useful to be able to plan and schedule actions in advance in order to ensure that desired actions will be able to be carried out without violating the security policy. However, there is a possibility that planning systems could accidentally leak information about future plans which should be kept confidential. In this paper, we investigate how sensitive information could be leaked by a planning system which uses security policies to ensure that planned actions will be able to occur. We formally define information leakage in this context. Then we present two techniques which can be used to mitigate or eliminate this information leakage and prove their security.
在早期的计算机系统中,只有简单的操作才会受到安全策略的约束。然而,计算机越来越多地处理复杂的组织任务,这些任务可能具有复杂的前置条件和后置条件。因此,能够提前计划和调度操作以确保能够在不违反安全策略的情况下执行所需的操作是很有用的。然而,规划系统有可能意外泄露有关未来计划的信息,这些信息本应保密。在本文中,我们研究了一个使用安全策略来确保计划的操作能够发生的计划系统如何泄露敏感信息。我们在此上下文中正式定义了信息泄漏。在此基础上,提出了两种可以减轻或消除这种信息泄漏并证明其安全性的技术。
{"title":"Avoiding information leakage in security-policy-aware planning","authors":"Keith Irwin, Ting Yu, W. Winsborough","doi":"10.1145/1456403.1456418","DOIUrl":"https://doi.org/10.1145/1456403.1456418","url":null,"abstract":"In early computer systems only simple actions would be governed by security policies. However, computers are increasingly handling complex organizational tasks which may have complex preconditions and postconditions. As such, it is useful to be able to plan and schedule actions in advance in order to ensure that desired actions will be able to be carried out without violating the security policy. However, there is a possibility that planning systems could accidentally leak information about future plans which should be kept confidential. In this paper, we investigate how sensitive information could be leaked by a planning system which uses security policies to ensure that planned actions will be able to occur. We formally define information leakage in this context. Then we present two techniques which can be used to mitigate or eliminate this information leakage and prove their security.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"50 1","pages":"85-94"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90667173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Does additional information always reduce anonymity? 附加信息总是降低匿名性吗?
Claudia Díaz, C. Troncoso, G. Danezis
We discuss information-theoretic anonymity metrics, that use entropy over the distribution of all possible recipients to quantify anonymity. We identify a common misconception: the entropy of the distribution describing the potentialreceivers does not always decrease given more information.We show the relation of these a-posteriori distributions with the Shannon conditional entropy, which is an average overall possible observations.
我们讨论了信息论的匿名度量,它使用所有可能的接收者分布上的熵来量化匿名性。我们发现了一个常见的误解:在给定更多信息的情况下,描述潜在接收者的分布熵并不总是减少。我们展示了这些后验分布与香农条件熵的关系,香农条件熵是一个平均的总体可能观测值。
{"title":"Does additional information always reduce anonymity?","authors":"Claudia Díaz, C. Troncoso, G. Danezis","doi":"10.1145/1314333.1314347","DOIUrl":"https://doi.org/10.1145/1314333.1314347","url":null,"abstract":"We discuss information-theoretic anonymity metrics, that use entropy over the distribution of all possible recipients to quantify anonymity. We identify a common misconception: the entropy of the distribution describing the potentialreceivers does not always decrease given more information.We show the relation of these a-posteriori distributions with the Shannon conditional entropy, which is an average overall possible observations.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"1993 1","pages":"72-75"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89054661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Making p2p accountable without losing privacy 在不丢失隐私的情况下使p2p负责
Mira Belenkiy, Melissa Chase, C. Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, Eric Rachlin
Peer-to-peer systems have been proposed for a wide variety of applications, including file-sharing, web caching, distributed computation, cooperative backup, and onion routing. An important motivation for such systems is self-scaling. That is, increased participation increases the capacity of the system. Unfortunately, this property is at risk from selfish participants. The decentralized nature of peer-to-peer systems makes accounting difficult. We show that e-cash can be a practical solution to the desire for accountability in peer-to-peer systems while maintaining their ability to self-scale. No less important, e-cash is a natural fit for peer-to-peer systems that attempt to provide (or preserve) privacy for their participants. We show that e-cash can be used to provide accountability without compromising the existing privacy goals of a peer-to-peer system. We show how e-cash can be practically applied to a file sharing application. Our approach includes a set of novel cryptographic protocols that mitigate the computational and communication costs of anonymous e-cash transactions, and system design choices that further reduce overhead and distribute load. We conclude that provably secure, anonymous, and scalable peer-to-peer systems are within reach.
点对点系统已经被提出用于各种各样的应用,包括文件共享、web缓存、分布式计算、协作备份和洋葱路由。这种系统的一个重要动机是自扩展。也就是说,更多的参与增加了系统的能力。不幸的是,这一财产正受到自私参与者的威胁。点对点系统的分散性使得记账变得困难。我们表明,电子现金可以成为点对点系统中问责制愿望的实用解决方案,同时保持其自我扩展的能力。同样重要的是,电子现金非常适合试图为参与者提供(或保护)隐私的点对点系统。我们表明,电子现金可以在不损害对等系统现有隐私目标的情况下提供问责制。我们将展示如何将电子现金实际应用于文件共享应用程序。我们的方法包括一组新颖的加密协议,以减轻匿名电子现金交易的计算和通信成本,以及进一步降低开销和分配负载的系统设计选择。我们的结论是,可以证明安全、匿名和可扩展的点对点系统是可以实现的。
{"title":"Making p2p accountable without losing privacy","authors":"Mira Belenkiy, Melissa Chase, C. Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, Eric Rachlin","doi":"10.1145/1314333.1314339","DOIUrl":"https://doi.org/10.1145/1314333.1314339","url":null,"abstract":"Peer-to-peer systems have been proposed for a wide variety of applications, including file-sharing, web caching, distributed computation, cooperative backup, and onion routing. An important motivation for such systems is self-scaling. That is, increased participation increases the capacity of the system. Unfortunately, this property is at risk from selfish participants. The decentralized nature of peer-to-peer systems makes accounting difficult. We show that e-cash can be a practical solution to the desire for accountability in peer-to-peer systems while maintaining their ability to self-scale. No less important, e-cash is a natural fit for peer-to-peer systems that attempt to provide (or preserve) privacy for their participants. We show that e-cash can be used to provide accountability without compromising the existing privacy goals of a peer-to-peer system.\u0000 We show how e-cash can be practically applied to a file sharing application. Our approach includes a set of novel cryptographic protocols that mitigate the computational and communication costs of anonymous e-cash transactions, and system design choices that further reduce overhead and distribute load. We conclude that provably secure, anonymous, and scalable peer-to-peer systems are within reach.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"55 1","pages":"31-40"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75372796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
Harvesting credentials in trust negotiation as an honest-but-curious adversary 作为一个诚实但好奇的对手,在信任谈判中获得信任
L.E. Olson, Mike Rosulek, M. Winslett
Need-to-know is a fundamental security concept: a party should not learn information that is irrelevant to its mission. In this paper we show that during a trust negotiation in which parties show their credentials to one another, an adversary can systematically harvest information about all of a victim's credentials that the attacker is entitled to see, regardless of their relevance to the negotiation. We present examples of need-to-know attacks with the trust negotiation approaches proposed Yu, Winslett, and Seamons; by Bonatti and Samarati; and by Winsborough and Li. Finally, we propose possible countermeasures against need-to-know attacks, and discuss their advantages and disadvantages.
“需要知道”是一个基本的安全概念:一方不应该了解与其任务无关的信息。在本文中,我们展示了在各方相互展示其凭证的信任谈判中,攻击者可以系统地获取攻击者有权看到的所有受害者凭证的信息,而不管它们与谈判的相关性如何。我们用Yu、Winslett和Seamons提出的信任协商方法展示了需要知道攻击的例子;博纳蒂和萨马拉蒂;温斯伯勒和李。最后,我们提出了针对需要知道攻击的可能对策,并讨论了它们的优缺点。
{"title":"Harvesting credentials in trust negotiation as an honest-but-curious adversary","authors":"L.E. Olson, Mike Rosulek, M. Winslett","doi":"10.1145/1314333.1314345","DOIUrl":"https://doi.org/10.1145/1314333.1314345","url":null,"abstract":"Need-to-know is a fundamental security concept: a party should not learn information that is irrelevant to its mission. In this paper we show that during a trust negotiation in which parties show their credentials to one another, an adversary can systematically harvest information about all of a victim's credentials that the attacker is entitled to see, regardless of their relevance to the negotiation. We present examples of need-to-know attacks with the trust negotiation approaches proposed Yu, Winslett, and Seamons; by Bonatti and Samarati; and by Winsborough and Li. Finally, we propose possible countermeasures against need-to-know attacks, and discuss their advantages and disadvantages.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"41 1","pages":"64-67"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81006560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Probabilistic analysis of onion routing in a black-box model 黑盒模型中洋葱路由的概率分析
J. Feigenbaum, Aaron Johnson, P. Syverson
We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication that abstracts the essential properties of onion routing in the presence of an active adversary that controls a portion of the network and knows all a priori distributions on user choices of destination. Our results quantify how much the adversary can gain in identifying users by exploiting knowledge of their probabilistic behavior. In particular, we show that a user uâ s anonymity is worst either when the other users always choose the destination u is least likely to visit or when the other users always choose the destination u chooses. This worst-case anonymity with an adversary that controls a fraction b of the routers is comparable to the bestcase anonymity against an adversary that controls a fraction pb.
我们对洋葱路由进行了概率分析。该分析是在匿名通信的黑盒模型中提出的,该模型抽象了洋葱路由的基本属性,在活跃的对手存在的情况下,该对手控制着网络的一部分,并且知道用户选择目的地的所有先验分布。我们的结果量化了攻击者通过利用用户概率行为的知识来识别用户所能获得的收益。特别是,当其他用户总是选择u最不可能访问的目的地,或者当其他用户总是选择u选择的目的地时,用户u的匿名性最差。攻击者控制一小部分路由器b时,这种最坏情况下的匿名性与攻击者控制一小部分路由器pb时的最佳匿名性相当。
{"title":"Probabilistic analysis of onion routing in a black-box model","authors":"J. Feigenbaum, Aaron Johnson, P. Syverson","doi":"10.1145/1314333.1314335","DOIUrl":"https://doi.org/10.1145/1314333.1314335","url":null,"abstract":"We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication that abstracts the essential properties of onion routing in the presence of an active adversary that controls a portion of the network and knows all a priori distributions on user choices of destination. Our results quantify how much the adversary can gain in identifying users by exploiting knowledge of their probabilistic behavior. In particular, we show that a user uâ s anonymity is worst either when the other users always choose the destination u is least likely to visit or when the other users always choose the destination u chooses. This worst-case anonymity with an adversary that controls a fraction b of the routers is comparable to the bestcase anonymity against an adversary that controls a fraction pb.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"94 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83556703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
期刊
Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1