DocumentCode
2365751
Title
Eavesdropping games: a graph-theoretic approach to privacy in distributed systems
Author
Franklin, Matthew ; Galil, Z. ; Yung, Moti
Author_Institution
Columbia Univ., NY, USA
fYear
1993
fDate
3-5 Nov 1993
Firstpage
670
Lastpage
679
Abstract
We initiate a graph-theoretic approach to study the (information-theoretic) maintenance of privacy in distributed environments in the presence of a bounded number of mobile eavesdroppers (“bugs”). For two fundamental privacy problems-secure message transmission and distributed database maintenance-we assume an adversary is “playing eavesdropping games,” coordinating the movement of the bugs among the sites to learn the current memory contents. We consider various mobility settings (adversaries), motivated by the capabilities (strength) of the bugging technologies (e.g., how fast can a bug be reassigned). We combinatorially characterize and compare privacy maintenance problems, determine their feasibility (under numerous bug models), suggest protocols for the feasible cases, and analyze their computational complexity
Keywords
computational complexity; data privacy; distributed databases; protocols; security of data; bugs; computational complexity; distributed database maintenance; distributed systems; eavesdropping games; graph-theoretic approach; mobile eavesdroppers; privacy; privacy maintenance problems; protocols; secure message transmission; Computer bugs; Cryptographic protocols; Data privacy; Data security; Distributed databases; Information security; Pattern analysis; Protection; Switches; Telecommunication traffic;
fLanguage
English
Publisher
ieee
Conference_Titel
Foundations of Computer Science, 1993. Proceedings., 34th Annual Symposium on
Conference_Location
Palo Alto, CA
Print_ISBN
0-8186-4370-6
Type
conf
DOI
10.1109/SFCS.1993.366820
Filename
366820
Link To Document