Skip to main content
Log in

P-Accountability: A Quantitative Study of Accountability in Networked Systems

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Accountability in computing implies that an entity should be held responsible for its behaviors with verifiable evidence. In order to study accountability, quantitative methods would be very helpful. Even though there are some researches in accountability, there are no other works which study quantitative accountability in practical settings, while quantitative accountability is defined as using quantities or metrics to measure accountability. In this paper, we propose P-Accountability, which is a quantitative approach to assess the degree of accountability for practical systems. P-Accountability is defined with two versions, a flat model and a hierarchical one, which can be chosen to use depending on how complex the system is. We then provide a complete case study that applies P-Accountability to PeerReview, which provides Byzantine fault detection for distributed systems. In addition, we propose Traceable PeerReview, which is our effort to apply PeerReview to wireless multi-hop environments. In addition, through the system evaluation we can show that the simulation outcomes are aligned with the numeric results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Department of Defense. (1985). Trusted computer system evaluation criteria. Technical Report 5200.28-STD, Department of Defense.

  2. Yumerefendi, A. R., & Chase, J. S. (2005) The role of accountability in dependable distributed systems. In Proceedings of HotDep

  3. Yumerefendi, A. R., & Chase, J. S. (2004) Trust but verify: accountability for network services. In Proceedings of the 11th workshop on ACM SIGOPS European workshop (p. 37). Leuven: ACM.

  4. Xiao, Y. (2009). Flow-net methodology for accountability in wireless networks. IEEE Network, 23(5), 30–37.

    Article  Google Scholar 

  5. Xiao, Y., Meng, K., & Takahashi, D. (2012). Accountability using flow-net: Design, implementation, and performance evaluation. Security and Communication Networks, 5(1), 29–49. doi:10.1002/sec.348.

    Article  Google Scholar 

  6. Takahashi, D., Xiao, Y., & Meng, K. (2014). Virtual flow-net for accountability and forensics of computer and network systems. Security and Communication Networks, 7(12), 2509–2526.

    Article  Google Scholar 

  7. Fu, B., & Xiao, Y. (2014). A multi-resolution flow-net methodology for accountable logging and its application in TCP/IP networks. In Proceedings of the IEEE international conference on communications 2014 (IEEE ICC 2014).

  8. Fu, B., & Xiao, Y. (2015). A multi-resolution accountable logging and its applications. Computer Networks, 89(4), 44–58.

    Article  Google Scholar 

  9. Fu, B., & Xiao, Y. (2012). Q-Accountable: A overhead-based quantifiable accountability in wireless networks. In Proceedings of IEEE consumer communications and networking conference (IEEE CCNC 2012) (pp. 138–142).

  10. Fu, B., & Xiao, Y. (2014). Accountability and Q-Accountable logging in wireless networks. Wireless Personal Communications, 75(3), 1715–1746.

    Article  Google Scholar 

  11. Haeberlen, A., Kouznetsov, P., & Druschel, P. (2007). PeerReview: Practical accountability for distributed systems. In Proceedings of twenty-first ACM SIGOPS symposium on operating systems principles (pp. 175–188). New York, NY: ACM.

  12. Andersen, D., Balakrishnan, H., Feamster, N., Koponen, T., Moon, D., & Shenker, S. (2007). Holding the internet accountable. ACM HotNets-VI.

  13. Andersen, D., Feamster, N., Koponen, T., Moon, D., & Shenker, S. (2008). Accountable internet protocol (AIP). In Proceedings of the ACM SIGCOMM 2008 conference on data communication (pp. 339–350). New York, NY: ACM.

  14. Mirkovic, J., & Reiher, P. (2008). Building accountability into the future internet. In 4th workshop on secure network protocols, 2008 (pp. 45–51). NPSec 2008.

  15. Backes, M., Druschel, P., Haeberlen, A., & Unruh, D. (2009). CSAR: A practical and provable technique to make randomized systems accountable. In Proceedings of the 16th annual network and distributed system security symposium (NDSS’09), San Diego, CA.

  16. Keller, E., Lee, R., & Rexford, J. (2009). Accountability in hosted virtual networks. In Proceedings of the ACM SIGCOMM workshop on virtualized infrastructure systems and architectures (VISA).

  17. Liu, W., Aggarwal, S., & Duan, Z. (2009). Incorporating accountability into internet email. In Proceedings of the 2009 ACM symposium on applied computing (pp. 875–882).

  18. Argyraki, K., Maniatis, P., Irzak, O., Ashish, S., Shenker, S., & Epfl, L. (2007). Loss and delay accountability for the internet. In IEEE international conference on network protocols, 2007 (pp. 194–205). ICNP 2007.

  19. Yumerefendi, A. R., & Chase J. S. (2007). Strong accountability for network storage. ACM Transactions on Storage, 3(3), 33. doi:10.1145/1288783.1288786.

    Article  Google Scholar 

  20. Briscoe, B., Jacquet, A., Moncaster, T., & Smith, A. (2009). Re-ECN: Adding accountability for causing congestion to TCP/IP. In IETF internet-draft.

  21. Briscoe, B., Jacquet, A., Moncaster, T., & Smith, A. (2009). Re-ECN: The motivation for adding accountability for causing congestion to TCP/IP. In IETF internet-draft.

  22. Zeng, L., Chen, H., & Xiao, Y. (2011). Accountable administration and implementation in operating systems. In Proceedings of the IEEE GLOBECOM 2011.

  23. Zeng, L., Chen, H., & Xiao, Y. (in press). Accountable administration in operating systems. International Journal of Information and Computer Security. http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijics.

  24. Xiao, Y. (2008). Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communication Magazine, 46(4), 116–126.

    Article  MathSciNet  Google Scholar 

  25. Liu, J., & Xiao, Y. (2011). Temporal accountability and anonymity in medical sensor networks. Mobile Networks and Applications, 16(6), 695–712.

    Article  Google Scholar 

  26. Liu, J., & Xiao, Y. (2012). An accountable neighborhood area network in smart grids. In Proceedings of 7th FTRA international conference on embedded and multimedia computing (EMC 2012), lecture notes in electrical engineering (Vol. 181, pp. 171–178). Springer.

  27. Liu, J., Xiao, Y., & Gao, J. (2014). Achieving accountability in smart grids. IEEE Systems Journal, 8(2), 493–508.

    Article  Google Scholar 

  28. Xiao, Z., Xiao, Y., & Chen, H. (2014). An accountable framework for sensing-oriented mobile cloud computing. Journal of Internet Technology, 15(5), 813–822. doi:10.6138/JIT.2014.15.5.11.

    Google Scholar 

  29. Ren, Y., Shen, J., Wang, J., Han, J., & Lee, S. (2015). Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 16(2), 317–323.

    Google Scholar 

  30. Li, J., Li, X., Yang, B., & Sun, X. (2015). Segmentation-based Image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, 10(3), 507–518.

    Article  Google Scholar 

  31. Xiao, Z., & Xiao, Y. (2012). PeerReview re-evaluation for accountability in distributed systems or networks. International Journal of Security and Networks, 7(1), 40–58.

    Article  Google Scholar 

  32. Xiao, Z., Xiao, Y., & Wu, J. (2010). A quantitative study of accountability in wireless multi-hop networks. In 2010 39th international conference on parallel processing (ICPP) (pp. 198–207).

  33. Zhou, Z., Wang, Y., Wu, Q. M. J., Yang, C., & Sun, X. (2016). Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2016.2601065.

    Google Scholar 

  34. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2016.2590944.

    Google Scholar 

  35. Fu, Z., Wu, X., Guan, C., Sun, X., & Ren, K. (2016). Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 11(12), 2706–2716.

    Article  Google Scholar 

  36. Rekhis, S., & Boudriga, N. A. (2009). Visibility: A novel concept for characterising provable network digital evidences. International Journal of Security and Networks, 4(4), 234–245.

    Article  Google Scholar 

  37. Ray, I., & Poolsappasit, N. (2008). Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. International Journal of Security and Networks, 3(2), 80–94.

    Article  Google Scholar 

  38. Madan, B. B., Goeva-Popstojanova, K., Vaidyanathan, K., & Trivedi, K. S. (2004). A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 56, 167–186.

    Article  Google Scholar 

  39. Breu, R., Innerhofer-Oberperfler, F., Yautsiukhin, A. (2008). Quantitative assessment of enterprise security system. In Third international conference on availability, reliability and security (ARES 08) (pp. 921–928).

  40. Sallhammar, K., Helvik, B., & Knapskog, S. (2006). A game-theoretic approach to stochastic security and dependability evaluation. In 2nd IEEE international symposium on dependable, autonomic and secure computing (pp. 6168).

  41. Bella, G., & Paulson, L. C. (2006). Accountability protocols: Formalized and verified. ACM Transactions on Information and System Security, 9(2), 138–161.

    Article  Google Scholar 

  42. Bella, G. Inductive verification of cryptographic protocols. Ph.D. thesis, Research Report 493, Computer Laboratory, University of Cambridge.

  43. Jagadeesan, R., Jeffrey, A., Pitcher, C., & Riely, J. (2009). Towards a theory of accountability and audit. In ESORICS’09, volume 5789 of LNCS (pp. 152–167). Springer.

  44. Küsters, R., Truderung, T., Vogt, A. (2010). Accountability: Definition and relationship to verifiability. In Proceedings of the 17th ACM conference on computer and communications security, New York, NY, USA (pp. 526–535).

  45. Milner, R. (1999). Communicating and mobile systems: the pi calculus. Cambridge: Cambridge University Press.

    MATH  Google Scholar 

  46. Feigenbaum, J., Jaggard, A. D., & Wright, R. N. (2011). Towards a formal model of accountability. In Proceedings of the 2011 workshop on new security paradigms workshop, New York, NY, USA (pp. 45–56).

  47. Ramazani, S., Kanno, J., Selmic, R. R., & Brust, M. R. (2016). Topological and combinatorial coverage hole detection in coordinate-free wireless sensor networks. International Journal of Sensor Networks, 21(1), 40–52.

    Google Scholar 

  48. Mu, J., Song, W., Wang, W., & Zhang, B. (2015). Self-healing hierarchical architecture for ZigBee network in smart grid application. International Journal of Sensor Networks, 17(2), 130–137.

    Article  Google Scholar 

  49. Xiao, Y., Shen, X., & Jiang, H. (2006). Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems. IEEE Journal on Selected Areas in Communications, 24(4), 836–842.

    Article  Google Scholar 

  50. Fantacci, R., & Tarch, D. (2006). Efficient scheduling techniques for high data-rate wireless personal area networks. International Journal of Sensor Networks, 2(1/2), 128–134.

    Article  Google Scholar 

  51. Paxson, V. (1997). End-to-end Internet packet dynamics. SIGCOMM Computer Communication Review, 27, 139–152.

    Article  Google Scholar 

  52. Liu, X., Liu, X., Li, Z., & Wang, B. (2014). The portable distributed fusion algorithm between loss and lossless systems. International Journal of Sensor Networks, 16(1), 16–22.

    Article  Google Scholar 

  53. Xiao, Y., & Rosdahl, J. (2002). Throughput and delay limits of IEEE 802.11. IEEE Communications Letters, 6(8), 355–357.

    Article  Google Scholar 

  54. Xiao, Y., & Rosdahl, J. (2003). Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols. ACM SIGMOBILE Mobile Computing and Communications Review, 7(2), 6–19.

    Article  Google Scholar 

  55. PeerReview Software. http://peerreview.mpi-sws.org/.

Download references

Acknowledgements

This work was supported in part by the US National Science Foundation (NSF) under grants CNS-0716211, CNS-0737325, CCF-0829827, and CNS-1059265. The authors would like to thank the anonymous reviewers for their valuable comments as well as the authors of PeerReview for offering their program source code.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Xiao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xiao, Z., Xiao, Y. & Wu, J. P-Accountability: A Quantitative Study of Accountability in Networked Systems. Wireless Pers Commun 95, 3785–3812 (2017). https://doi.org/10.1007/s11277-017-4026-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4026-5

Keywords

Navigation