Abstract
Service on-demand (SoD) systems allow their users to regulate the sharing of common resources via a voting process. A common application example is the collaborative scheduling of multimedia transmissions in e-radio or video streaming services. Therefore, high user commitment and participation is critical to the success of a SoD system. Securing a SoD system against common attacks, such as vote flooding, can impose client anonymity retraction, online registering and access control mechanisms. Nonetheless, such processes can degrade the users’ quality of experience, discouraging user participation. The present study proposes a defense mechanism against vote flooding attacks that can operate under complete vote anonymity and without any user access restrictions. The novel scheme is implemented as a vote filtering scheme, executed prior to each service scheduling decision. The proposed scheme has linear complexity and is shown via simulations to considerably mitigate or completely negate the effects of several attacks types.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aksoy, D., Franklin, M.: R\(\times \)W: a scheduling approach for large-scale on-demand data broadcast. IEEE/ACM Trans. Network. 7(6), 846–860 (1999)
Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), pp. 195–209, Pittsburgh, 23–25 June 2008 (2008). http://doi.ieeecomputersociety.org/10.1109/CSF.2008.26
Baiardi, F., Falleni, A., Granchi, R., Martinelli, F., Petrocchi, M., Vaccarelli, A.: Seas, a secure e-voting protocol: design and implementation. Comput. Secur. 24(8), 642–652 (2005). http://dx.doi.org/10.1016/j.cose.2005.07.008
Benkaouz, Y., Erradi, M.: A distributed protocol for privacy preserving aggregation with non-permanent participants. Computing. J. 3, 1–20 (2014). doi:10.1007/s00607-013-0373-6
Benkaouz, Y., Guerraoui, R., Erradi, M., Huc, F.: A distributed polling with probabilistic privacy. In: IEEE 32nd Symposium on Reliable Distributed Systems (SRDS 2013), pp. 41–50, Braga, 1–3 October 2013 (2013). http://dx.doi.org/10.1109/SRDS.2013.13
Camenisch, J.L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)
Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030–1044 (1985). http://doi.acm.org/10.1145/4372.4373
Chen, Y., Jan, J., Chen, C.: The design of a secure anonymous internet voting system. Comput. Secur. 23(4), 330–337 (2004). http://dx.doi.org/10.1016/j.cose.2004.01.015
Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: 2008 IEEE Symposium on Security and Privacy (S&P 2008), pp. 354–368, Oakland, 18–21 May 2008. http://dx.doi.org/10.1109/SP.2008.32
Cortier, V., Smyth, B.: Attacking and fixing helios: an analysis of ballot secrecy. J. Comput. Secur. 21(1), 89–148 (2013)
Cranor, L.F., Cytron, R.: Sensus: a security-conscious electronic polling system for the internet. In: 30th Annual Hawaii International Conference on System Sciences (HICSS-30), pp. 561–570, Maui, 7–10 January 1997. http://doi.ieeecomputersociety.org/10.1109/HICSS.1997.661700
Degroot, M.H.: Reaching a consensus. J. Am. Stat. Assoc. 69(345), 118–121 (1974)
Dykeman, H.D., Ammar, M.H., Wong, J.W.: Scheduling algorithms for videotex systems under broadcast delivery. In: Proceedings of the International Conference on Communications (ICC 1986), pp. 1847–1851, Toronto, June 1986
Englert, B., Gheissari, R.: Multivalued and deterministic peer-to-peer polling in social networks with reputation conscious participants. In: 12th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2013), pp. 895–902, Melbourne, July 16–18 2013. http://dx.doi.org/10.1109/TrustCom.2013.109
Fan, C., Sun, W.: An efficient multi-receipt mechanism for uncoercible anonymous electronic voting. Math. Comput. Model. 48(9–10), 1611–1627 (2008). http://dx.doi.org/10.1016/j.mcm.2008.05.039
Frith, D.: E-voting security: hope or hype? Netw. Secur. 2007(11), 14–16 (2007)
Gambs, S., Guerraoui, R., Harkous, H., Huc, F., Kermarrec, A.: Scalable and secure polling in dynamic distributed networks. In: IEEE 31st Symposium on Reliable Distributed Systems (SRDS 2012), pp. 181–190, Irvine, 8–11 October 2012. http://dx.doi.org/10.1109/SRDS.2012.63
Greensmith, J., Aickelin, U., Tedesco, G.: Information fusion for anomaly detection with the dendritic cell algorithm. Inf. Fusion 11(1), 21–34 (2010)
Gritzali, D.: Principles and requirements for a secure e-voting system. Comput. Secur. 21(6), 539–556 (2002). http://dx.doi.org/10.1016/S0167-4048(02)01014–3
Guerraoui, R., Huguenin, K., Kermarrec, A., Monod, M., Vigfusson, Y.: Decentralized polling with respectable participants. J. Parallel Distrib. Comput. 72(1), 13–26 (2012). http://dx.doi.org/10.1016/j.jpdc.2011.09.003
Hoang, B., Imine, A.: Efficient polling protocol for decentralized social networks. CoRR abs/1412.7653 (2014). http://arxiv.org/abs/1412.7653
Joaquim, R., Zúquete, A., Ferreira, P.: Revs-a robust electronic voting system. IADIS Int. J. WWW/Internet 1(2), 47–63 (2003)
Jonker, H., Mauw, S., Pang, J.: Privacy and verifiability in voting systems: Methods, developments and trends. Comput. Sci. Rev. 10, 1–30 (2013). http://dx.doi.org/10.1016/j.cosrev.2013.08.002
Li, C., Hwang, M., Liu, C.: An electronic voting protocol with deniable authentication for mobile ad hoc networks. Comput. Commun. 31(10), 2534–2540 (2008). http://dx.doi.org/10.1016/j.comcom.2008.03.018
Liaskos, C., Petridou, S., Papadimitriou, G.: Towards realizable, low-cost broadcast systems for dynamic environments. IEEE/ACM Trans. Netw. 19(2), 383–392 (2011)
Liaskos, C., Papadimitriou, G., Douligeris, C.: Sensor swarm query filtering: heightened attack resilience for broadcast on-demand services. In: IEEE Symposium on Computers and Communications (ISCC 2013), pp. 000312–000317. IEEE (2013)
Liaskos, C., Tsioliaridou, A., Papadimitriou, G., Nicopolitidis, P.: Minimal wireless broadcast schedules for multi-objective pursuits. IEEE Transactions on Vehicular Technology p. preprint (2014)
Malkhi, D., Margo, O., Pavlov, E.: E-voting without cryptography. In: Financial Cryptography, 6th International Conference (FC 2002), pp. 1–15, Southampton, 11–14 March 2002. http://dx.doi.org/10.1007/3-540-36504-4_1
Meng, B.: A critical review of receipt-freeness and coercion-resistance. Inf. Technol. J. 8(7), 934–964 (2009)
Meng, B., Li, Z., Qin, J.: A receipt-free coercion-resistant remote internet voting protocol without physical assumptions through deniable encryption and trapdoor commitment scheme. J. Softw. 5(9), 942–949 (2010)
Misra, J., Gries, D.: Finding repeated elements. Sci. Comput. Program. 2(2), 143–152 (1982)
Pardede, E., Taniar, D., Awan, I., Al-Sudani, W., Gill, A., Li, C., Wang, J., Liu, F.: Protection through multimedia CAPTCHAs. In: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2010), p. 63. ACM Press (2010)
Pietronero, L., Tosatti, E., Tosatti, V., Vespignani, A.: Explaining the uneven distribution of numbers in nature: the laws of Benford and Zipf. Physica A 293(1–2), 297–304 (2001)
Qadah, G.Z., Taha, R.: Electronic voting systems: Requirements, design, and implementation. Computer Standards Interfaces 29(3), 376–386 (2007). http://dx.doi.org/10.1016/j.csi.2006.06.001
Sampigethaya, K., Poovendran, R.: A framework and taxonomy for comparison of electronic voting schemes. Comput. Secur. 25(2), 137–153 (2006). http://dx.doi.org/10.1016/j.cose.2005.11.003
Sharaf, M.A., Chrysanthis, P.: On-Demand Broadcast: new Challenges and Scheduling Algorithms. In: Proceedings of the 1st Hellenic Conference on the Management of Data (2002)
Sieka, B., Kshemkalyani, A.D., Singhal, M.: On the security of polling protocols in peer-to-peer systems. In: 4th International Conference on Peer-to-Peer Computing (P2P 2004), pp. 36–44, Zurich, 15–17 August 2004. http://doi.ieeecomputersociety.org/10.1109/PTP.2004.1334929
Smart, M., Ritter, E.: True trustworthy elections: remote electronic voting using trusted computing. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., GarcĂa Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 187–202. Springer, Heidelberg (2011)
Tsioliaridou, A., Zhang, C., Liaskos, C.: Fast and fair handling of multimedia captcha flows. International Journal of Interactive Mobile Technologies (2015). (To appear )
XJ Technologies: The AnyLogic Simulator (2013). http://www.xjtek.com/anylogic/
Zwierko, A., Kotulski, Z.: A light-weight e-voting system with distributed trust. Electr. Notes Theor. Comput. Sci. 168, 109–126 (2007). http://dx.doi.org/10.1016/j.entcs.2006.12.004
Acknowledgment
This work was partially supported by EU FP7 project OPTET (Grant no.317631).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Samaras, C.V., Tsioliaridou, A., Liaskos, C., Spiliotopoulos, D., Ioannidis, S. (2015). Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering . In: Conti, M., Schunter, M., Askoxylakis, I. (eds) Trust and Trustworthy Computing. Trust 2015. Lecture Notes in Computer Science(), vol 9229. Springer, Cham. https://doi.org/10.1007/978-3-319-22846-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-22846-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22845-7
Online ISBN: 978-3-319-22846-4
eBook Packages: Computer ScienceComputer Science (R0)