Abstract
Dynamic collaborative peer groups generally have constantly changing application requirements and varied security requirements, and require a secure and reliable group communication. Self-organizing groups like f/oss motivate the need for dynamic multi-level access control. Currently there are some integrated solutions for secure group communication, but very few allow dynamic multi-level access control based on trust. We propose a framework for collaborative groups which integrates authentication, admission control, policy based access control, adaptive trust and key management. Our model permits peers to regulate their own behavior by deploying access control policies dynamically based on the behavior and trust level of peers in the group and the current group composition. Peers can collaboratively modify policies governing their level. Our trust metric is a tunable metric based on context specific attributes. Functionality of members in a group is also dynamic and the group can dynamically prioritise requests for join. We tested the behavior of groups under different application scenario by implementing our framework in overlay simulator peersim integrated with Prolog. Our experiments show that dynamic polices based on the adaptive trust and changing group composition lead to better group efficiency as compared to static access control policies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kim, Y., Mazzocchi, D., Tsudik, G.: Admission control in peer groups. In: Proceedings of the Second IEEE International Symposium on Network Computing and Applications, April 16-18, p. 131 (2003)
Saxena, N., Tsudik, G.: Admission Control in Peer-to- Peer: Design and Performance Evaluation. In: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN (2003)
Rotaru, C.N., Li, N.: A Framework for Role Based Access control in Group Communication Systems. In: IEEE Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, PDCS (2004)
Zhang, Y., Li, X., Huai, J., Liu, Y.: Access control in Peer to Peer collaborative Systems. In: ICDCSW 2005, IEEE-2005 (2005)
Tran, H., Hitchens, M., Varadharajan, V., Watters, P.: A trust based access control framework for P2P file sharing systems. In: Proceedings of the 38th Hawaii International Conference on Systems Sciences (2005)
Repantis, T., Kalogeraki, V.: Decentralized Trust Management for AdHoc PeertoPeer Networks. In: MPAC, November 27-December 1. ACM, New York (2006)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: Eigenrep: Reputation management in p2p networks. In: Proc. of 12th International WWW Conference, pp. 640–651 (2003)
Chatterjee, M., Sivakumar, G., Bernard, M.: Dynamic Policy Based Model for Trust Based Access Control in P2P Applications. In: IEEE International Conference on Communications 2009, ICC 2009, Dresden, Germany, June 14-18, pp. 1–5 (2009)
Xiong, L., Liu, L.: A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities. In: Proceedings of the Fourth ACM Conference on Electronic Commerce, San Diego, CA, USA, June 09-12, pp. 228–229 (2003)
Xiong, L., Liu, L.: PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge And Data Engineering 16(7) (July 2004)
Lai, K., Feldman, M., et al.: Incentives for Cooperation in Peer-to-Peer Networks. In: Proceedings of the Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 5-6 (2003)
PeerSim Simulator Documentation, http://peersim.sourceforge.net/
Becker, M.Y., Sewell, P.: Cassandra: Flexible trust management, applied to electronic health records. In: 17th IEEE Computer Security Foundations Workshop (CSFW), pp. 139–154 (2004)
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder policy specification language. In: International Workshop on Policies for Distributed Systems and Networks, pp. 18–38 (2001)
Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: security analysis in trust management. Journal of the ACM 52(3), 474–514 (2005)
Sasturkar, A., Yang, P., Stoller, S.D., Ramakrishnan, C.R.: Policy analysis for administrative role based access control. In: Workshop on Computer Security Foundations, pp. 124–138 (2006)
Hezberg, A., Mass, Y., Michaeli, J., Ravid, Y., Naor, D.: Access Control Meets Public Key Infrastructure. In: Proc. 2000 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 2–14 (2000)
Dougherty, D., Fisler, K., Krishnamurti, S.: Specifying and reasoning about Dynamic Access control Policies. In: Third International Joint Conference on Automated Reasoning, IJCAR 2006, pp. 632–646 (2006)
Kim, Y., Perrig, A., Tsudik, G.: Tree-Based Group Key Agreement. ACM Transactions on Information and System Security 7(1), 60–96 (2004)
F/OSS Documentation, http://foss.in
Amir, Y., Nita-Rotaru, C., Stanton, J., Tsudik, G.: Secure Spread: An Integrated Architecture for Secure Group Communication. IEEE Transactions on Dependable and Secure Computing 2(3) (July-September 2005)
Agarwal, D.A., Chevassut, O., Thompson, M.R., Tsudik, G.: An Integrated Solution for Secure Group Communication in Wide-Area Networks. In: Proceedings of the 6th IEEE Symposium on Computers and Communications, Hammamet, Tunisia, July 3-5, pp. 22–28 (2001)
Scacchi, W.: Free/Open Source Software Development Practices in the Computer Game Community, Institute for Software Research. University of California, Technical Report (April 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chatterjee, M., Sivakumar, G. (2010). Dynamic Policy Adaptation for Collaborative Groups. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)