Skip to main content

Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

  • Conference paper
Data Management in Grid and Peer-to-Peer Systems (Globe 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5697))

Included in the following conference series:

Abstract

In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

This research was partially funded through project P2PGRID, TIN2007-68050-C03-03, of the Ministry of Education and Science, Spain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage. In: FAST 2003, pp. 29–42 (2003)

    Google Scholar 

  2. Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing Remote Untrusted Storage. In: NDSS 2003, Internet Society (ISOC), February 2003, pp. 131–145 (2003)

    Google Scholar 

  3. Pathak, V., Iftode, L.: Byzantine fault tolerant public key authentication in peer-to-peer systems. Computer Networks Journal 50(4), 579–596 (2006)

    Article  MATH  Google Scholar 

  4. Crispo, B., Sivasubramanian, S., Mazzoleni, P., Bertino, E.: P-hera: Scalable fine-grained access control for p2p infrastructures. In: ICPADS 2005, pp. 585–591 (2005)

    Google Scholar 

  5. Gaheni, A., Chandra, C.: Parameterized access control: from design to prototype. In: SecureComm 2008, pp. 1–8 (2008)

    Google Scholar 

  6. Palomar, E., Tapiador, J.M.E., Hernandez-Castro, J.C., Ribagorda, A.: Secure content access and replication in pure p2p networks. Comput. Commun. 31(2), 266–279 (2008)

    Article  Google Scholar 

  7. Zou, X., Dai, Y.S., Bertino, E.: A practical and flexible key management mechanism for trusted collaborative computing. In: INFOCOM 2008, pp. 1211–1219 (2008)

    Google Scholar 

  8. Artigas, M., et al.: A novel methodology for constructing secure multipath overlays. IEEE Internet Computing 9(6), 50–57 (2005)

    Article  Google Scholar 

  9. Castro, M., et al.: Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev. 36(SI), 299–314 (2002)

    Article  Google Scholar 

  10. Saxena, N., Tsudik, G., Yi, J.H.: Threshold cryptography in p2p and manets: The case of access control. Computer Networks 51(12), 3632–3649 (2007)

    Article  MATH  Google Scholar 

  11. Menezes, A.J., Vanstone, S.A., Oorschot, P.C.V.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton (1996)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sánchez-Artigas, M., García-López, P. (2009). Pace: Privacy-Protection for Access Control Enforcement in P2P Networks. In: Hameurlain, A., Tjoa, A.M. (eds) Data Management in Grid and Peer-to-Peer Systems. Globe 2009. Lecture Notes in Computer Science, vol 5697. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03715-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03715-3_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03714-6

  • Online ISBN: 978-3-642-03715-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics