Abstract
In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.
This research was partially funded through project P2PGRID, TIN2007-68050-C03-03, of the Ministry of Education and Science, Spain.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage. In: FAST 2003, pp. 29–42 (2003)
Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing Remote Untrusted Storage. In: NDSS 2003, Internet Society (ISOC), February 2003, pp. 131–145 (2003)
Pathak, V., Iftode, L.: Byzantine fault tolerant public key authentication in peer-to-peer systems. Computer Networks Journal 50(4), 579–596 (2006)
Crispo, B., Sivasubramanian, S., Mazzoleni, P., Bertino, E.: P-hera: Scalable fine-grained access control for p2p infrastructures. In: ICPADS 2005, pp. 585–591 (2005)
Gaheni, A., Chandra, C.: Parameterized access control: from design to prototype. In: SecureComm 2008, pp. 1–8 (2008)
Palomar, E., Tapiador, J.M.E., Hernandez-Castro, J.C., Ribagorda, A.: Secure content access and replication in pure p2p networks. Comput. Commun. 31(2), 266–279 (2008)
Zou, X., Dai, Y.S., Bertino, E.: A practical and flexible key management mechanism for trusted collaborative computing. In: INFOCOM 2008, pp. 1211–1219 (2008)
Artigas, M., et al.: A novel methodology for constructing secure multipath overlays. IEEE Internet Computing 9(6), 50–57 (2005)
Castro, M., et al.: Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev. 36(SI), 299–314 (2002)
Saxena, N., Tsudik, G., Yi, J.H.: Threshold cryptography in p2p and manets: The case of access control. Computer Networks 51(12), 3632–3649 (2007)
Menezes, A.J., Vanstone, S.A., Oorschot, P.C.V.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sánchez-Artigas, M., García-López, P. (2009). Pace: Privacy-Protection for Access Control Enforcement in P2P Networks. In: Hameurlain, A., Tjoa, A.M. (eds) Data Management in Grid and Peer-to-Peer Systems. Globe 2009. Lecture Notes in Computer Science, vol 5697. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03715-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-03715-3_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03714-6
Online ISBN: 978-3-642-03715-3
eBook Packages: Computer ScienceComputer Science (R0)