Skip to main content

Securing Data Accountability in Decentralized Systems

  • Conference paper
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (OTM 2006)

Abstract

We consider a decentralized setting in which agents exchange data along with usage policies. Agents may violate the intended usage policies, although later on auditing authorities may verify the agents’ data accountability with respect to the intended policies. Using time-stamping and signature schemes, we design and analyze an efficient cryptographic protocol generating communication evidences, in such a way that an agent is accountable in our protocol only if the agent behaved honestly.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ansper, A., Buldas, A., Saarepera, M., Willemson, J.: Improving the availability of time-stamping services. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 360–375. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. http://www.authentidate.com/

  3. Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. In: ACM Transactions on Information and System Security (TISSEC), pp. 71–127 (2003)

    Google Scholar 

  4. Buldas, A., Laud, P., Saarepera, M., Willemson, J.: Universally composable time-stamping schemes with audit. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 359–373. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Cederquist, J.G., Corin, R.J., Dekker, M.A.C., Etalle, S., den Hartog, J.I.: An audit logic for accountability. In: 6th Int. Workshop on Policies for Distributed Systems & Networks (POLICY), pp. 34–43. IEEE Computer Society Press, Los Alamitos (2005)

    Chapter  Google Scholar 

  6. Corin, R., Etalle, S., den Hartog, J.I., Lenzini, G., Staicu, I.: A logic for auditing accountability in decentralized systems. In: Proc. of the 2nd IFIP Workshop on Formal Aspects in Security and Trust (FAST), vol. 173, pp. 187–202. Springer, Heidelberg (2004)

    Google Scholar 

  7. Corin, R., Etalle, S., Saptawijaya, A.: A logic for constraint-based security protocol analysis. In: IEEE Symposium on Security and Privacy (2006)

    Google Scholar 

  8. http://www.digistamp.com/

  9. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)

    Article  MATH  MathSciNet  Google Scholar 

  10. Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281–308 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  11. ISO IEC 18014-3, time-stamping services – part 3: Mechanisms producing linked tokens

    Google Scholar 

  12. Jajodia, S., Samarati, P., Subrahmanian, V.S., Bertino, E.: A unified framework for enforcing multiple access control policies. In: Peckham, J. (ed.) SIGMOD 1997. Proc. International Conference on Management of Data, pp. 474–485. ACM Press, New York (1997)

    Chapter  Google Scholar 

  13. Park, J., Sandhu, R.: Towards usage control models: Beyond traditional access control. In: Bertino, E. (ed.) Proc. of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 57–64. ACM Press, New York (2002)

    Chapter  Google Scholar 

  14. Sandhu, R., Samarati, P.: Access control: Principles and practice. IEEE Communications Magazine 32(9), 40–48 (1994)

    Article  Google Scholar 

  15. http://www.surety.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Corin, R., Galindo, D., Hoepman, JH. (2006). Securing Data Accountability in Decentralized Systems. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_86

Download citation

  • DOI: https://doi.org/10.1007/11915034_86

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48269-7

  • Online ISBN: 978-3-540-48272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics