Skip to main content
Erschienen in: Wireless Personal Communications 4/2015

01.02.2015

Secure Personal Content Networking Over Untrusted Devices

verfasst von: Uichin Lee, Joshua Joy, YoungTae Noh

Erschienen in: Wireless Personal Communications | Ausgabe 4/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Securely sharing and managing personal content is a challenging task in multi-device environments. In this paper, we design and implement a new platform called personal content networking (PCN). Our work is inspired by content-centric networking (CCN) because we aim to enable access to personal content using its name instead of its location. The unique challenge of PCN is to support secure file operations such as replication, updates, and access control over distributed untrusted devices. The primary contribution of this work is the design and implementation of a secure content management platform that supports secure updates, replications, and fine-grained content-centric access control of files. Furthermore, we demonstrate its feasibility through a prototype implementation on the CCNx skeleton.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
An attacker can eavesdrop on the channel and make independent connections with the victims and then relay messages between the victims making the victims believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.
 
Literatur
1.
Zurück zum Zitat Baden, R., Bender, A., Spring, N., Bhattacharjee, B., & Starins, D. (2009). Persona: An online social network with user-defined privacy. In SIGCOMM’09. Barcelona, Spain. Baden, R., Bender, A., Spring, N., Bhattacharjee, B., & Starins, D. (2009). Persona: An online social network with user-defined privacy. In SIGCOMM’09. Barcelona, Spain.
2.
Zurück zum Zitat Balasubramaniam, S., & Pierce, B. C. (1998). What is a file synchronizer? In MobiCom. Balasubramaniam, S., & Pierce, B. C. (1998). What is a file synchronizer? In MobiCom.
3.
Zurück zum Zitat Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In SP’07. Oakland, CA. Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In SP’07. Oakland, CA.
4.
Zurück zum Zitat Blaze, M. (1993). A cryptographic file system for unix. In CCS. Fairfax, VA. Blaze, M. (1993). A cryptographic file system for unix. In CCS. Fairfax, VA.
5.
Zurück zum Zitat Burnside, M., Clarke, D., Devadas, S., Rivest, R. (2002). Distributed SPKI/SDSI-based security for networks of devices. Technical report, MIT Laboratory for Computer Science. Burnside, M., Clarke, D., Devadas, S., Rivest, R. (2002). Distributed SPKI/SDSI-based security for networks of devices. Technical report, MIT Laboratory for Computer Science.
7.
Zurück zum Zitat Chothia, T., & Chatzikokolakis, K. (2005). A survey of anonymous peer-to-peer file-sharing. In Proceedings of the 2005 international conference on embedded and ubiquitous computing. Chothia, T., & Chatzikokolakis, K. (2005). A survey of anonymous peer-to-peer file-sharing. In Proceedings of the 2005 international conference on embedded and ubiquitous computing.
8.
Zurück zum Zitat Clarke, D., Elien, J. E., Ellison, C., Fredette, M., Morcos, A., & Rivest, R. L. (2001). Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4), 285–322. Clarke, D., Elien, J. E., Ellison, C., Fredette, M., Morcos, A., & Rivest, R. L. (2001). Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4), 285–322.
10.
Zurück zum Zitat Dearman, D., & Pierce, J. S. (2008). It’s on my other computer! Computing with multiple devices. In CHI’08. Florence, Italy. Dearman, D., & Pierce, J. S. (2008). It’s on my other computer! Computing with multiple devices. In CHI’08. Florence, Italy.
11.
Zurück zum Zitat Dohrmann, S., & Ellison, C. M. (2002). Public-key support for collaborative groups. In Annual PKI Research Workshop. Hanover, NH. Dohrmann, S., & Ellison, C. M. (2002). Public-key support for collaborative groups. In Annual PKI Research Workshop. Hanover, NH.
12.
Zurück zum Zitat Druschel, P., & Rowstron, A. (2001). PAST: A large-scale persistent peer-to-peer storage utility. In HotOS’01. Schloss Elmau, Germany. Druschel, P., & Rowstron, A. (2001). PAST: A large-scale persistent peer-to-peer storage utility. In HotOS’01. Schloss Elmau, Germany.
13.
Zurück zum Zitat Ellison, C. M. (1996). Establishing identity without certification authorities. In USENIX’96. San Diego, CA. Ellison, C. M. (1996). Establishing identity without certification authorities. In USENIX’96. San Diego, CA.
14.
Zurück zum Zitat Ferreira, R., Grama, A., & Jagannathan, S. (2005). Plethora: An efficient wide-area storage system. In High performance computing—HiPC 2004. Ferreira, R., Grama, A., & Jagannathan, S. (2005). Plethora: An efficient wide-area storage system. In High performance computing—HiPC 2004.
15.
Zurück zum Zitat Ford, B., Strauss, J., Lesniewski-Laas, C., Rhea, S., Kaashoek, F., & Morris, R. (2006). Persistent personal names for globally connected mobile devices. In OSDI’06. Seattle, WA. Ford, B., Strauss, J., Lesniewski-Laas, C., Rhea, S., Kaashoek, F., & Morris, R. (2006). Persistent personal names for globally connected mobile devices. In OSDI’06. Seattle, WA.
17.
Zurück zum Zitat Geambasu, R., Balazinska, M., Gribble, S. D., & Levy, H. M. (2007). HomeViews: Peer-to-peer middleware for personal data sharing applications. In SIGMOD’07. Beijing, China. Geambasu, R., Balazinska, M., Gribble, S. D., & Levy, H. M. (2007). HomeViews: Peer-to-peer middleware for personal data sharing applications. In SIGMOD’07. Beijing, China.
18.
Zurück zum Zitat Gifford, D. K., Jouvelot, P., Sheldon, M. A., James, W., & O’Toole, J. (2007). Semantic file system. In SOSP’91. Beijing, China. Gifford, D. K., Jouvelot, P., Sheldon, M. A., James, W., & O’Toole, J. (2007). Semantic file system. In SOSP’91. Beijing, China.
19.
Zurück zum Zitat Goh, E. J., Shacham, H., Modadugu, N., & Boneh, D. (2003). SiRiUS: Securing remote untrusted storage. In NDSS’03. Goh, E. J., Shacham, H., Modadugu, N., & Boneh, D. (2003). SiRiUS: Securing remote untrusted storage. In NDSS’03.
20.
Zurück zum Zitat Henderson, S., & Srinivasan, A. (2009). An empirical analysis of personal digital document structures. In HCII’09. San Diego, CA. Henderson, S., & Srinivasan, A. (2009). An empirical analysis of personal digital document structures. In HCII’09. San Diego, CA.
21.
Zurück zum Zitat Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., & Braynard, R. L. (2009). Networking named content. In CoNEXT’09. Rome, Italy. Jacobson, V., Smetters, D. K., Thornton, J. D., Plass, M. F., Briggs, N. H., & Braynard, R. L. (2009). Networking named content. In CoNEXT’09. Rome, Italy.
22.
Zurück zum Zitat Jones, W. (2007). Personal information management. Annual Review of Information Science and Technologys, 41(1), 453–504.CrossRef Jones, W. (2007). Personal information management. Annual Review of Information Science and Technologys, 41(1), 453–504.CrossRef
23.
Zurück zum Zitat Jones, W., Phuwanartnurak, A. J., Gill, R., & Bruce, H. (2005). Don’t take my folders away! Organizing personal information to get things done. In CHI’05. Portland, OR. Jones, W., Phuwanartnurak, A. J., Gill, R., & Bruce, H. (2005). Don’t take my folders away! Organizing personal information to get things done. In CHI’05. Portland, OR.
24.
Zurück zum Zitat Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., & Fu, K. (2003). Plutus: Scalable secure file sharing on untrusted storage. In FAST’03. San Francisco, CA. Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., & Fu, K. (2003). Plutus: Scalable secure file sharing on untrusted storage. In FAST’03. San Francisco, CA.
25.
Zurück zum Zitat Kent, S., Lynn, C., & Seo, K. (2000). Secure border gateway protocol (S-BGP). IEEE JSAC, 18(4), 582–592. Kent, S., Lynn, C., & Seo, K. (2000). Secure border gateway protocol (S-BGP). IEEE JSAC, 18(4), 582–592.
26.
Zurück zum Zitat Lansdale, M. W. (1988). The psychology of personal information management. Applied Ergonomics, 19(1), 55–66.CrossRef Lansdale, M. W. (1988). The psychology of personal information management. Applied Ergonomics, 19(1), 55–66.CrossRef
27.
Zurück zum Zitat Mazieres, D., Kaminsky, M., Kaashoek, M. F., & Witchel, E. (1999). Separating key management from file system security. In SOSP’99. Charleston, SC. Mazieres, D., Kaminsky, M., Kaashoek, M. F., & Witchel, E. (1999). Separating key management from file system security. In SOSP’99. Charleston, SC.
28.
Zurück zum Zitat Miltchev, S., Prevelakis, V., Ioannidis, S., Ioannidis, J., Keromytis, A. D., & Smith, J. M. (2003). Secure and flexible global file sharing. In USENIX. Miltchev, S., Prevelakis, V., Ioannidis, S., Ioannidis, J., Keromytis, A. D., & Smith, J. M. (2003). Secure and flexible global file sharing. In USENIX.
29.
Zurück zum Zitat Miltchev, S., Smith, J. M., Prevelakis, V., Keromytis, A., & Ioannidis, S. (2008). Decentralized access control in distributed file systems. ACM Computing Surveys, 40(3), 10. Miltchev, S., Smith, J. M., Prevelakis, V., Keromytis, A., & Ioannidis, S. (2008). Decentralized access control in distributed file systems. ACM Computing Surveys, 40(3), 10.
30.
Zurück zum Zitat Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACIM SIGOPS Operating Systems Review, 36(SI), 31–44. Muthitacharoen, A., Morris, R., Gil, T. M., & Chen, B. (2002). Ivy: A read/write peer-to-peer file system. ACIM SIGOPS Operating Systems Review, 36(SI), 31–44.
31.
Zurück zum Zitat Nightingale, E. B., & Flinn, J. (2004). Energy-efficiency and storage flexibility in the blue file system. In OSDI’04. San Francisco, CA. Nightingale, E. B., & Flinn, J. (2004). Energy-efficiency and storage flexibility in the blue file system. In OSDI’04. San Francisco, CA.
32.
Zurück zum Zitat Page, T. W., Guy, R. G., Heidemann, J. S., Ratner, D., Reiher, P., Goel, A., et al. (1998). Perspectives on optimistically replicated peer-to-peer filing. SPE, 28(2), 155–180. Page, T. W., Guy, R. G., Heidemann, J. S., Ratner, D., Reiher, P., Goel, A., et al. (1998). Perspectives on optimistically replicated peer-to-peer filing. SPE, 28(2), 155–180.
33.
Zurück zum Zitat Paluska, J. M., Saff, D., Yeh, T., & Chen, K. (2004). Footloose: A case for physical eventual consistency and selective conflict resolution. In WMCSA’04. Lake District National Park, UK. Paluska, J. M., Saff, D., Yeh, T., & Chen, K. (2004). Footloose: A case for physical eventual consistency and selective conflict resolution. In WMCSA’04. Lake District National Park, UK.
34.
Zurück zum Zitat Pedersen, T. P. (1991). Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO’91. Santa Barbara, CA. Pedersen, T. P. (1991). Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO’91. Santa Barbara, CA.
35.
Zurück zum Zitat Peek, D., Flinn, J. (2006). EnsemBlue: Integrating distributed storage and consumer electronics. In OSDI. Peek, D., Flinn, J. (2006). EnsemBlue: Integrating distributed storage and consumer electronics. In OSDI.
37.
Zurück zum Zitat Personal Content and Home Network Storage. (2007). the Perfect Storm, Tom Coughlin. Personal Content and Home Network Storage. (2007). the Perfect Storm, Tom Coughlin.
38.
Zurück zum Zitat Reiher, P., Heidemann, J. S., Ratner, D., Skinner, G., & Popek, G. J. (2004). Resolving file conflicts in the ficus file system. In USENIX’94. Boston, MA. Reiher, P., Heidemann, J. S., Ratner, D., Skinner, G., & Popek, G. J. (2004). Resolving file conflicts in the ficus file system. In USENIX’94. Boston, MA.
39.
Zurück zum Zitat Rivest, R. (1998). Can we eliminate certificate revocation lists? In In financial cryptography. Rivest, R. (1998). Can we eliminate certificate revocation lists? In In financial cryptography.
40.
Zurück zum Zitat Salmon, B., Schlosser, S. W., Cranor, L. F., & Ganger, G. R. (2009). Perspective: Semantic data management for the home. In FAST’09. San Francisco, CA. Salmon, B., Schlosser, S. W., Cranor, L. F., & Ganger, G. R. (2009). Perspective: Semantic data management for the home. In FAST’09. San Francisco, CA.
41.
Zurück zum Zitat Sandhu, R. S., & Samarati, P. (1994). Access control: Principle and practice. IEEE Communications Magazine, 9(32), 40–49.CrossRef Sandhu, R. S., & Samarati, P. (1994). Access control: Principle and practice. IEEE Communications Magazine, 9(32), 40–49.CrossRef
42.
Zurück zum Zitat Satyanarayanan, M., Kistler, J. J., Kumar, P., Okasaki, M. E., Siegel, E. H., & Steere, D. C. (1990). Coda: A highly available file system for a distributed workstation environment. IEEE Transaction on Computers, 39(4), 447–459.CrossRef Satyanarayanan, M., Kistler, J. J., Kumar, P., Okasaki, M. E., Siegel, E. H., & Steere, D. C. (1990). Coda: A highly available file system for a distributed workstation environment. IEEE Transaction on Computers, 39(4), 447–459.CrossRef
43.
Zurück zum Zitat Sobti, S., Garg, N., Zhang, C., Yu, X., Krishnamurthy, A., & Wang, R. Y. (2002). PersonalRAID: Mobile storage for distributed and disconnected computers. In FAST’02. Monterey, CA. Sobti, S., Garg, N., Zhang, C., Yu, X., Krishnamurthy, A., & Wang, R. Y. (2002). PersonalRAID: Mobile storage for distributed and disconnected computers. In FAST’02. Monterey, CA.
44.
Zurück zum Zitat Strauss, J., Lesniewski-Laas, C., Paluska, J. M., Ford, B., Morris, R., & Kaashoek, F. (2009). Device transparency: A new model for mobile storage. In HotStorage’09. Big Sky, MT. Strauss, J., Lesniewski-Laas, C., Paluska, J. M., Ford, B., Morris, R., & Kaashoek, F. (2009). Device transparency: A new model for mobile storage. In HotStorage’09. Big Sky, MT.
45.
Zurück zum Zitat Terry, D., Theimer, M., Petersen, K., Demers, A., Spreitzer, M., & Hauser, C. (1995). Managing update conflicts in Bayou, a weakly connected replicated storage system. In SOSP’95. Terry, D., Theimer, M., Petersen, K., Demers, A., Spreitzer, M., & Hauser, C. (1995). Managing update conflicts in Bayou, a weakly connected replicated storage system. In SOSP’95.
46.
Zurück zum Zitat Veeraraghavan, K., Myrick, A., & Flinn, J. (2008). Cobalt: Separating content distribution from authorization in distributed file systems. In FAST’08. Veeraraghavan, K., Myrick, A., & Flinn, J. (2008). Cobalt: Separating content distribution from authorization in distributed file systems. In FAST’08.
49.
Zurück zum Zitat Yu, S., Ren, K., & Lou, W. (2008). Attribute-based content distribution with hidden policy. In NPSec’08. Orlando, FL. Yu, S., Ren, K., & Lou, W. (2008). Attribute-based content distribution with hidden policy. In NPSec’08. Orlando, FL.
50.
Zurück zum Zitat Yu, S., Wang, C., Ren, K., Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM’10. Yu, S., Wang, C., Ren, K., Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM’10.
51.
Zurück zum Zitat Zhang, L., et al. (2010). Named data networking (NDN) project. Technical report, PARC technical report NDN-0001. Zhang, L., et al. (2010). Named data networking (NDN) project. Technical report, PARC technical report NDN-0001.
Metadaten
Titel
Secure Personal Content Networking Over Untrusted Devices
verfasst von
Uichin Lee
Joshua Joy
YoungTae Noh
Publikationsdatum
01.02.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-2093-4

Weitere Artikel der Ausgabe 4/2015

Wireless Personal Communications 4/2015 Zur Ausgabe

Neuer Inhalt