• DocumentCode
    2365751
  • Title

    Eavesdropping games: a graph-theoretic approach to privacy in distributed systems

  • Author

    Franklin, Matthew ; Galil, Z. ; Yung, Moti

  • Author_Institution
    Columbia Univ., NY, USA
  • fYear
    1993
  • fDate
    3-5 Nov 1993
  • Firstpage
    670
  • Lastpage
    679
  • Abstract
    We initiate a graph-theoretic approach to study the (information-theoretic) maintenance of privacy in distributed environments in the presence of a bounded number of mobile eavesdroppers (“bugs”). For two fundamental privacy problems-secure message transmission and distributed database maintenance-we assume an adversary is “playing eavesdropping games,” coordinating the movement of the bugs among the sites to learn the current memory contents. We consider various mobility settings (adversaries), motivated by the capabilities (strength) of the bugging technologies (e.g., how fast can a bug be reassigned). We combinatorially characterize and compare privacy maintenance problems, determine their feasibility (under numerous bug models), suggest protocols for the feasible cases, and analyze their computational complexity
  • Keywords
    computational complexity; data privacy; distributed databases; protocols; security of data; bugs; computational complexity; distributed database maintenance; distributed systems; eavesdropping games; graph-theoretic approach; mobile eavesdroppers; privacy; privacy maintenance problems; protocols; secure message transmission; Computer bugs; Cryptographic protocols; Data privacy; Data security; Distributed databases; Information security; Pattern analysis; Protection; Switches; Telecommunication traffic;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Foundations of Computer Science, 1993. Proceedings., 34th Annual Symposium on
  • Conference_Location
    Palo Alto, CA
  • Print_ISBN
    0-8186-4370-6
  • Type

    conf

  • DOI
    10.1109/SFCS.1993.366820
  • Filename
    366820