Don't Trust Your Roommate, or, Access Control and Replication Protocols in "Home" Environments
نویسندگان
چکیده
A “home” sharing environment consists of the data sharing relationships between family members, friends, and acquaintances. We argue that this environment, far from being simple, has sharing and trust relationships as complex as any general-purpose network. Such environments need strong access control and privacy guarantees. We show that avoiding information leakage requires both to be integrated directly into (rather than layered on top of) replication protocols, and propose a system structure that meets these guarantees.
منابع مشابه
An Efficient Data Replication Strategy in Large-Scale Data Grid Environments Based on Availability and Popularity
The data grid technology, which uses the scale of the Internet to solve storage limitation for the huge amount of data, has become one of the hot research topics. Recently, data replication strategies have been widely employed in distributed environment to copy frequently accessed data in suitable sites. The primary purposes are shortening distance of file transmission and achieving files from ...
متن کاملHome Health Care: The Necessity in the Health Policy of Iran
Home health care is a wide range of health care services that can be given in your home for an illness or injury (1). During last decade, home health care is taken into consideration seriously. The concept of home health care began in the 1850's when traveling health care professionals provided in-home visits to patients in need of health care and unable to seek such care on their own (2). ...
متن کاملSecurity in Pesto
Pesto aims at providing highly available and secure storage for long-lived data to mobile users roaming into (potentially) untrusted environments. This paper presents and discusses the security mechanisms and features of Pesto. Security in Pesto encompasses the following three aspects: availability, safety, and privacy. Most existing systems focus on a subset of these aspects, or assume they ca...
متن کاملTowards a localisation of trust framework for pervasive environments
Pervasive computing envisions an environment in which we are surrounded by many embedded computer devices. The existence of those networked devices provides us with a mobile, spontaneous and dynamic way to access various resources provided by different (security policy) domains. In recent years, we have witnessed the evolutionary development of numerous multiple domain applications. One of the ...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کامل