Abstract
Accountability in computing implies that an entity should be held responsible for its behaviors with verifiable evidence. In order to study accountability, quantitative methods would be very helpful. Even though there are some researches in accountability, there are no other works which study quantitative accountability in practical settings, while quantitative accountability is defined as using quantities or metrics to measure accountability. In this paper, we propose P-Accountability, which is a quantitative approach to assess the degree of accountability for practical systems. P-Accountability is defined with two versions, a flat model and a hierarchical one, which can be chosen to use depending on how complex the system is. We then provide a complete case study that applies P-Accountability to PeerReview, which provides Byzantine fault detection for distributed systems. In addition, we propose Traceable PeerReview, which is our effort to apply PeerReview to wireless multi-hop environments. In addition, through the system evaluation we can show that the simulation outcomes are aligned with the numeric results.
Similar content being viewed by others
References
Department of Defense. (1985). Trusted computer system evaluation criteria. Technical Report 5200.28-STD, Department of Defense.
Yumerefendi, A. R., & Chase, J. S. (2005) The role of accountability in dependable distributed systems. In Proceedings of HotDep
Yumerefendi, A. R., & Chase, J. S. (2004) Trust but verify: accountability for network services. In Proceedings of the 11th workshop on ACM SIGOPS European workshop (p. 37). Leuven: ACM.
Xiao, Y. (2009). Flow-net methodology for accountability in wireless networks. IEEE Network, 23(5), 30–37.
Xiao, Y., Meng, K., & Takahashi, D. (2012). Accountability using flow-net: Design, implementation, and performance evaluation. Security and Communication Networks, 5(1), 29–49. doi:10.1002/sec.348.
Takahashi, D., Xiao, Y., & Meng, K. (2014). Virtual flow-net for accountability and forensics of computer and network systems. Security and Communication Networks, 7(12), 2509–2526.
Fu, B., & Xiao, Y. (2014). A multi-resolution flow-net methodology for accountable logging and its application in TCP/IP networks. In Proceedings of the IEEE international conference on communications 2014 (IEEE ICC 2014).
Fu, B., & Xiao, Y. (2015). A multi-resolution accountable logging and its applications. Computer Networks, 89(4), 44–58.
Fu, B., & Xiao, Y. (2012). Q-Accountable: A overhead-based quantifiable accountability in wireless networks. In Proceedings of IEEE consumer communications and networking conference (IEEE CCNC 2012) (pp. 138–142).
Fu, B., & Xiao, Y. (2014). Accountability and Q-Accountable logging in wireless networks. Wireless Personal Communications, 75(3), 1715–1746.
Haeberlen, A., Kouznetsov, P., & Druschel, P. (2007). PeerReview: Practical accountability for distributed systems. In Proceedings of twenty-first ACM SIGOPS symposium on operating systems principles (pp. 175–188). New York, NY: ACM.
Andersen, D., Balakrishnan, H., Feamster, N., Koponen, T., Moon, D., & Shenker, S. (2007). Holding the internet accountable. ACM HotNets-VI.
Andersen, D., Feamster, N., Koponen, T., Moon, D., & Shenker, S. (2008). Accountable internet protocol (AIP). In Proceedings of the ACM SIGCOMM 2008 conference on data communication (pp. 339–350). New York, NY: ACM.
Mirkovic, J., & Reiher, P. (2008). Building accountability into the future internet. In 4th workshop on secure network protocols, 2008 (pp. 45–51). NPSec 2008.
Backes, M., Druschel, P., Haeberlen, A., & Unruh, D. (2009). CSAR: A practical and provable technique to make randomized systems accountable. In Proceedings of the 16th annual network and distributed system security symposium (NDSS’09), San Diego, CA.
Keller, E., Lee, R., & Rexford, J. (2009). Accountability in hosted virtual networks. In Proceedings of the ACM SIGCOMM workshop on virtualized infrastructure systems and architectures (VISA).
Liu, W., Aggarwal, S., & Duan, Z. (2009). Incorporating accountability into internet email. In Proceedings of the 2009 ACM symposium on applied computing (pp. 875–882).
Argyraki, K., Maniatis, P., Irzak, O., Ashish, S., Shenker, S., & Epfl, L. (2007). Loss and delay accountability for the internet. In IEEE international conference on network protocols, 2007 (pp. 194–205). ICNP 2007.
Yumerefendi, A. R., & Chase J. S. (2007). Strong accountability for network storage. ACM Transactions on Storage, 3(3), 33. doi:10.1145/1288783.1288786.
Briscoe, B., Jacquet, A., Moncaster, T., & Smith, A. (2009). Re-ECN: Adding accountability for causing congestion to TCP/IP. In IETF internet-draft.
Briscoe, B., Jacquet, A., Moncaster, T., & Smith, A. (2009). Re-ECN: The motivation for adding accountability for causing congestion to TCP/IP. In IETF internet-draft.
Zeng, L., Chen, H., & Xiao, Y. (2011). Accountable administration and implementation in operating systems. In Proceedings of the IEEE GLOBECOM 2011.
Zeng, L., Chen, H., & Xiao, Y. (in press). Accountable administration in operating systems. International Journal of Information and Computer Security. http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijics.
Xiao, Y. (2008). Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communication Magazine, 46(4), 116–126.
Liu, J., & Xiao, Y. (2011). Temporal accountability and anonymity in medical sensor networks. Mobile Networks and Applications, 16(6), 695–712.
Liu, J., & Xiao, Y. (2012). An accountable neighborhood area network in smart grids. In Proceedings of 7th FTRA international conference on embedded and multimedia computing (EMC 2012), lecture notes in electrical engineering (Vol. 181, pp. 171–178). Springer.
Liu, J., Xiao, Y., & Gao, J. (2014). Achieving accountability in smart grids. IEEE Systems Journal, 8(2), 493–508.
Xiao, Z., Xiao, Y., & Chen, H. (2014). An accountable framework for sensing-oriented mobile cloud computing. Journal of Internet Technology, 15(5), 813–822. doi:10.6138/JIT.2014.15.5.11.
Ren, Y., Shen, J., Wang, J., Han, J., & Lee, S. (2015). Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 16(2), 317–323.
Li, J., Li, X., Yang, B., & Sun, X. (2015). Segmentation-based Image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, 10(3), 507–518.
Xiao, Z., & Xiao, Y. (2012). PeerReview re-evaluation for accountability in distributed systems or networks. International Journal of Security and Networks, 7(1), 40–58.
Xiao, Z., Xiao, Y., & Wu, J. (2010). A quantitative study of accountability in wireless multi-hop networks. In 2010 39th international conference on parallel processing (ICPP) (pp. 198–207).
Zhou, Z., Wang, Y., Wu, Q. M. J., Yang, C., & Sun, X. (2016). Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2016.2601065.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2016.2590944.
Fu, Z., Wu, X., Guan, C., Sun, X., & Ren, K. (2016). Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 11(12), 2706–2716.
Rekhis, S., & Boudriga, N. A. (2009). Visibility: A novel concept for characterising provable network digital evidences. International Journal of Security and Networks, 4(4), 234–245.
Ray, I., & Poolsappasit, N. (2008). Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. International Journal of Security and Networks, 3(2), 80–94.
Madan, B. B., Goeva-Popstojanova, K., Vaidyanathan, K., & Trivedi, K. S. (2004). A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 56, 167–186.
Breu, R., Innerhofer-Oberperfler, F., Yautsiukhin, A. (2008). Quantitative assessment of enterprise security system. In Third international conference on availability, reliability and security (ARES 08) (pp. 921–928).
Sallhammar, K., Helvik, B., & Knapskog, S. (2006). A game-theoretic approach to stochastic security and dependability evaluation. In 2nd IEEE international symposium on dependable, autonomic and secure computing (pp. 61–68).
Bella, G., & Paulson, L. C. (2006). Accountability protocols: Formalized and verified. ACM Transactions on Information and System Security, 9(2), 138–161.
Bella, G. Inductive verification of cryptographic protocols. Ph.D. thesis, Research Report 493, Computer Laboratory, University of Cambridge.
Jagadeesan, R., Jeffrey, A., Pitcher, C., & Riely, J. (2009). Towards a theory of accountability and audit. In ESORICS’09, volume 5789 of LNCS (pp. 152–167). Springer.
Küsters, R., Truderung, T., Vogt, A. (2010). Accountability: Definition and relationship to verifiability. In Proceedings of the 17th ACM conference on computer and communications security, New York, NY, USA (pp. 526–535).
Milner, R. (1999). Communicating and mobile systems: the pi calculus. Cambridge: Cambridge University Press.
Feigenbaum, J., Jaggard, A. D., & Wright, R. N. (2011). Towards a formal model of accountability. In Proceedings of the 2011 workshop on new security paradigms workshop, New York, NY, USA (pp. 45–56).
Ramazani, S., Kanno, J., Selmic, R. R., & Brust, M. R. (2016). Topological and combinatorial coverage hole detection in coordinate-free wireless sensor networks. International Journal of Sensor Networks, 21(1), 40–52.
Mu, J., Song, W., Wang, W., & Zhang, B. (2015). Self-healing hierarchical architecture for ZigBee network in smart grid application. International Journal of Sensor Networks, 17(2), 130–137.
Xiao, Y., Shen, X., & Jiang, H. (2006). Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems. IEEE Journal on Selected Areas in Communications, 24(4), 836–842.
Fantacci, R., & Tarch, D. (2006). Efficient scheduling techniques for high data-rate wireless personal area networks. International Journal of Sensor Networks, 2(1/2), 128–134.
Paxson, V. (1997). End-to-end Internet packet dynamics. SIGCOMM Computer Communication Review, 27, 139–152.
Liu, X., Liu, X., Li, Z., & Wang, B. (2014). The portable distributed fusion algorithm between loss and lossless systems. International Journal of Sensor Networks, 16(1), 16–22.
Xiao, Y., & Rosdahl, J. (2002). Throughput and delay limits of IEEE 802.11. IEEE Communications Letters, 6(8), 355–357.
Xiao, Y., & Rosdahl, J. (2003). Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols. ACM SIGMOBILE Mobile Computing and Communications Review, 7(2), 6–19.
PeerReview Software. http://peerreview.mpi-sws.org/.
Acknowledgements
This work was supported in part by the US National Science Foundation (NSF) under grants CNS-0716211, CNS-0737325, CCF-0829827, and CNS-1059265. The authors would like to thank the anonymous reviewers for their valuable comments as well as the authors of PeerReview for offering their program source code.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xiao, Z., Xiao, Y. & Wu, J. P-Accountability: A Quantitative Study of Accountability in Networked Systems. Wireless Pers Commun 95, 3785–3812 (2017). https://doi.org/10.1007/s11277-017-4026-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4026-5