DocumentCode :
266712
Title :
A P2P based usage control enforcement scheme resilient to re-injection attacks
Author :
Leontiadis, Ilias ; Molva, Refik ; Onen, Melek
Author_Institution :
Networking & Security Dept., EURECOM, Sophia-Antipolis, France
fYear :
2014
fDate :
19-19 June 2014
Firstpage :
1
Lastpage :
8
Abstract :
Existing privacy controls based on access control techniques do not prevent massive dissemination of private data by unauthorized users. We suggest a usage control enforcement scheme that allows users to gain control over their data during its entire lifetime. The scheme is based on a peer-to-peer architecture whereby a different set of peers is randomly selected for data assignment. Usage control is achieved based on the assumption that at least t out of any set of n peers will not behave maliciously. Such a system would still suffer from re-injection attacks whereby attackers can gain ownership of data and the usage policy thereof by simply re-storing data after slight modification of the content. In order to cope with re-injection attacks the scheme relies on a similarity detection mechanism. The robustness of the scheme has been evaluated in an experimental setting using a variety of re-injection attacks.
Keywords :
authorisation; data privacy; peer-to-peer computing; P2P based usage control enforcement scheme; access control techniques; data assignment; peer-to-peer architecture; privacy control; re-injection attacks; similarity detection mechanism; Access control; Cryptography; Distributed databases; Peer-to-peer computing; Protocols; Resistance;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2014 IEEE 15th International Symposium on a
Conference_Location :
Sydney, NSW
Type :
conf
DOI :
10.1109/WoWMoM.2014.6918974
Filename :
6918974
Link To Document :
بازگشت