ACCESS CONTROL AND JOINT MANAGEMENT FOR COLLABORATIVE PEER GROUPS

Wenhua Qi

Abstract

Collaborative peer groups means that multiple self-organizing peers aggregating in a controlled manner to accomplish some collective goals. Peer groups share the properties of peer-to-peer overlay network, including full decentralization, symmetric abilities, and dynamism, which make security problems more complicated. Most prior work focused on authentication, group key management and communication security. However, access control is an important precondition of many security services. Intend for a pure decentralized model without centralized server, our framework employs a distributed delegation authorization mechanism and proposes an authority selection scheme. Multiple authorities could exist in this design, which could avoid single point of failure. Based on the role-based trust management language RT, this paper presents an attribute-based access control framework, and describes a formal joint authorization protocol under voting scheme, to satisfy security requirements of multiple peers. We also introduce our implementation experience by applying JXTA technology.

References

  1. Sunderam, V., Pascoe, J., Loader, R., 2003. Towards a Framework for Collaborative Peer Groups. In the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid.
  2. Gong, L., 2002. Project JXTA: A Technology Overview. from http://www.jxta.org/project/www/docs/ TechOverview.pdf.
  3. Rodeh, O., Birman, K., Dolev, D., 2000. Using AVL Trees for Fault Tolerant Group Key Management. Technical Report 2000-1823, Cornell University, Computer Science.
  4. Judge, P., Ammar, M., 2002. Gothic: A Group Access Control Architecture for Secure Multicast and Anycast. In INFOCOM.
  5. Agarwal, D., Chevassut, O., Thompson, M., Tsudik, G., 2001. An Integrated Solution for Secure Group Communication in Wide-Area Networks. In the 6th IEEE Symposium on Computers and Communications.
  6. Li, N., Mitchell, J., Winsborough, W., 2002. Design of a Role-Based Trust Management Framework. In the IEEE Symposium on Security and Privacy.
  7. Kamvar, S., Schlosser, M., 2003. EigenRep: Reputation Management in P2P Networks. In the Twelfth International World Wide Web Conference.
  8. L, H., Yoon, K., 1981. Multiple Criteria Decision Making. Lecture Notes in Economics and Mathematical Systems.
  9. Sun Microsystems Project JXTA v2.0: Java Programmer's Guide. 2002, from http://www.jxta.org/.
  10. Altman, J., 2003. Sun Microsystems, Project JXTA: PKI Security for JXTA Overly Networks. from http://www.jxta.org/docs/pki-security-for-jxta.pdf.
  11. McDaniel, P., Prakash, A., Honeyman, P., 1999. Antigone: A Flexible Framework for Secure Group Communication. In the 8th USENIX Security Symposium.
  12. Kim, Y., Mazzocchi, D., Tsudik, G., 2003. Admission Control in Peer Groups. In the IEEE International Symposium on Network Computing and Applications.
  13. Thompson, M., Essiari, A., Mudumbai, S., 2003. Certificate-Based Authorization Policy in a PKI Environment. ACM Transactions on Information and System Security.
  14. Nita-Rotaru, C., Li, N., 2004. A Framework for RoleBased Access Control in Group Communication Systems. In the International Workshop on Security in Parallel and Distributed Systems.
Download


Paper Citation


in Harvard Style

Qi W. (2006). ACCESS CONTROL AND JOINT MANAGEMENT FOR COLLABORATIVE PEER GROUPS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 83-86. DOI: 10.5220/0002099200830086


in Bibtex Style

@conference{secrypt06,
author={Wenhua Qi},
title={ACCESS CONTROL AND JOINT MANAGEMENT FOR COLLABORATIVE PEER GROUPS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={83-86},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002099200830086},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - ACCESS CONTROL AND JOINT MANAGEMENT FOR COLLABORATIVE PEER GROUPS
SN - 978-972-8865-63-4
AU - Qi W.
PY - 2006
SP - 83
EP - 86
DO - 10.5220/0002099200830086