• DocumentCode
    3374763
  • Title

    Enabling conditional cross-domain data sharing via a cryptographic approach

  • Author

    Bianchi, Giuseppe ; Rajabi, Hanieh ; Sgorlon, Marco

  • Author_Institution
    CNIT, Univ. Roma Tor Vergata, Rome, Italy
  • fYear
    2011
  • fDate
    12-13 Dec. 2011
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Cross-domain Internet-scale collaborative security is affected by a native dichotomy. On one side, sharing of monitoring data across domains may significantly help in detecting large scale threats and attacks; on the other side, data sharing conflicts with the need to protect network customers´ privacy and confidentiality of business and operational information. The approach first proposed in this paper enables what we call “conditional data sharing”, i.e., permit cross-domain sharing of fine-grained organized subsets of network security data (called monitoring data feeds), only when a threshold number of domains are ready to reveal their data for the same feed. The proposed approach revolves on a careful combination of distributed threshold based cryptography with identity-based encryption. It appears scalable and easy to deploy, not requiring neither a-priori monitoring data feeds identification, nor explicit coordination among domains. Protection is accomplished by “simply” using different cryptographic keys per feed, and automatically permitting per-feed key reconstruction upon the occurrence of independent and asynchronous per-domain/per-feed alerts.
  • Keywords
    Internet; cryptography; data privacy; groupware; peer-to-peer computing; attack detection; business information confidentiality; conditional cross-domain data sharing; cross-domain Internet-scale collaborative security; cryptographic approach; cryptographic key; dichotomy; distributed threshold based cryptography; identity-based encryption; independent asynchronous per-domain-per-feed alerts; monitoring data sharing; network customers privacy protection; network security data; operational information confidentiality; per-feed key reconstruction; threat detection; Encryption; Feeds; Monitoring; Protocols; Public key;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Multimedia Systems Architecture and Application (IMSAA), 2011 IEEE 5th International Conference on
  • Conference_Location
    Bangalore, Karnataka
  • Print_ISBN
    978-1-4577-1329-3
  • Type

    conf

  • DOI
    10.1109/IMSAA.2011.6156365
  • Filename
    6156365