Don't Trust Your Roommate, or, Access Control and Replication Protocols in "Home" Environments

نویسندگان

  • Vassilios Lekakis
  • Yunus Basagalar
  • Pete Keleher
چکیده

A “home” sharing environment consists of the data sharing relationships between family members, friends, and acquaintances. We argue that this environment, far from being simple, has sharing and trust relationships as complex as any general-purpose network. Such environments need strong access control and privacy guarantees. We show that avoiding information leakage requires both to be integrated directly into (rather than layered on top of) replication protocols, and propose a system structure that meets these guarantees.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Data Replication Strategy in Large-Scale Data Grid Environments Based on Availability and Popularity

The data grid technology, which uses the scale of the Internet to solve storage limitation for the huge amount of data, has become one of the hot research topics. Recently, data replication strategies have been widely employed in distributed environment to copy frequently accessed data in suitable sites. The primary purposes are shortening distance of file transmission and achieving files from ...

متن کامل

Home Health Care: The Necessity in the Health Policy of Iran

    Home health care is a wide range of health care services that can be given in your home for an illness or injury (1). During last decade, home health care is taken into consideration seriously. The concept of home health care began in the 1850's when traveling health care professionals provided in-home visits to patients in need of health care and unable to seek such care on their own (2). ...

متن کامل

Security in Pesto

Pesto aims at providing highly available and secure storage for long-lived data to mobile users roaming into (potentially) untrusted environments. This paper presents and discusses the security mechanisms and features of Pesto. Security in Pesto encompasses the following three aspects: availability, safety, and privacy. Most existing systems focus on a subset of these aspects, or assume they ca...

متن کامل

Towards a localisation of trust framework for pervasive environments

Pervasive computing envisions an environment in which we are surrounded by many embedded computer devices. The existence of those networked devices provides us with a mobile, spontaneous and dynamic way to access various resources provided by different (security policy) domains. In recent years, we have witnessed the evolutionary development of numerous multiple domain applications. One of the ...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012