Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients

Rainer Schick, Christoph Ruland

2012

Abstract

Nowadays, it can be assumed that valuable private data can be securely transmitted from one sender to one (or more) recipients. An unsolved problem following the transmission is addressed by this paper. The sender of some confidential information does not know what happens with the data after the transmission. If the message appears in a place it should not, the originator does not know who published it unauthorized. In order to solve this problem, this paper introduces a new non-repudiation service that allows tracking the way of protected data via several recipients.

References

  1. Barg, E., Blakley, G. R., and Kabatiansky, G. A. (2003). Digital fingerprinting codes: Problem statements, constructions, identification of traitors. In IEEE Transactions on Information Theory Vol. 49, pages 852-865.
  2. Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., and Kalker, T. (2008). Digital Watermarking and Steganography. Elsevier, second edition edition.
  3. Ford, W. (1994). Computer Communications Security: Principles, Standard Protocols and Techniques. Prentice Hall, first edition edition.
  4. INDICARE Project (2006). Consumer's guide to digital rights management.
  5. ISO/IEC 10181-4 (1997). Information technology - Open Systems Interconnection - Security frameworks for open systems: Non-repudiation framework. International Organization for Standardization.
  6. ISO/IEC 13888-1 (2009). Information technology - Security techniques - Non-repudiation - Part 1: General. International Organization for Standardization.
  7. ISO/IEC 13888-2 (2010). Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques. International Organization for Standardization.
  8. ISO/IEC 13888-3 (2009). Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques. International Organization for Standardization.
  9. Kremer, S., Markowitch, O., and Zhou, J. (2002). An intensive survey of fair non-repudiation protocols. In Computer Communications Vol. 25, pages 1606-1621.
  10. Liu, R., Trappe, W., Wang, J., Wu, M., and Zhao, H. (2005). Multimedia Fingerprinting Forensics for Traitor Tracing. Hindawi Publishing Corporation.
  11. RFC 4949 (2007). Internet Security Glossary, Version 2. Network Working Group.
  12. RFC 5280 (2008). Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Network Working Group.
  13. Scheidemann, V. (2008). Endpoint security: Data loss prevention.
  14. Schick, R. and Ruland, C. (2011a). Data leakage tracking - non-repudiation of forwarding. In Communications in Computer and Information Science Vol. 251, pages 163-173.
  15. Schick, R. and Ruland, C. (2011b). Document tracking - on the way to a new security service. In IEEE Conference on Network and Information Systems Security, pages 89-93.
  16. Schneier, B. (2001). The futility of digital copy prevention.
  17. Wang, Y., Doherty, J. F., and van Dyck, R. (2001). A watermarking algorithm for fingerprinting intelligence images. In John Hopkins University, pages 21-24.
  18. Zhou, J. and Gollmann, D. (1996). A fair non-repudiation protocol. In IEEE Symposium on Security and Privacy, pages 55-61.
Download


Paper Citation


in Harvard Style

Schick R. and Ruland C. (2012). Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 387-390. DOI: 10.5220/0004053303870390


in Bibtex Style

@conference{secrypt12,
author={Rainer Schick and Christoph Ruland},
title={Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={387-390},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004053303870390},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients
SN - 978-989-8565-24-2
AU - Schick R.
AU - Ruland C.
PY - 2012
SP - 387
EP - 390
DO - 10.5220/0004053303870390