Modern Security with Traditional Distributed Algorithms

نویسندگان

  • Rachid Guerraoui
  • Marko Vukolić
چکیده

Several manufacturers have recently started to equip their hardware with security modules. These typically consist of smart cards or special microprocessors. Examples include the “Embedded Security Subsystem” within the recent IBM Thinkpad or the IBM 4758 secure co-processor board [4]. In fact, a large body of computer and device manufacturers has founded the Trusted Computing Group (TCG) [9] to promote this idea. In short, the computer hosts, besides its regular processor that can potentially be controlled by a malicious user, a trusted security module (Fig. 1). Because its hardware is tamper proof, the software running within a security module is certified and security modules can communicate through secure channels. However, communication goes through the untrusted hosts and dishonest ones can drop messages exchanged between the underlying security modules. As a consequence, the security modules form a distributed system of processes that can suffer from general omission failures [7] (i.e., either send or receive omission failures). In other words, the very existence of security modules transforms malicious behavior into omissions. These omissions are not however random but can be committed by dishonest hosts at specific points of the computation. In the following, we illustrate the transformation and some of the underlying issues through the problem of multi-party fair exchange. This problem is key to trading electronic items in systems of mutually untrusted parties. Each party expects to trade an item for another one, and each item has a description that is supposed to match this item. Each party hosts a security module and we assume here a synchronous model of computation, i.e., communication between security modules is synchronous and secure [3, 6], yet omissions can be committed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Static Task Allocation in Distributed Systems Using Parallel Genetic Algorithm

Over the past two decades, PC speeds have increased from a few instructions per second to several million instructions per second. The tremendous speed of today's networks as well as the increasing need for high-performance systems has made researchers interested in parallel and distributed computing. The rapid growth of distributed systems has led to a variety of problems. Task allocation is a...

متن کامل

Central Control Over Distributed Routing – Public Review

Modern network management is foremost a case of precise control: to implement practical traffic engineering and network security policies, a network operator needs to control the exact path traffic takes through a network. While conceptually simple, accomplishing this level of control is surprisingly difficult with traditional network control planes; in the end, the underlying distributed routi...

متن کامل

Role of the Globalization of Communications (Internet and Satellite) on Young Women’s Leisure Time (Case study: Young Women in Mazandaran)

Today, leisure time is changing by globalization and using of information technology. Most of people especially women prefer to spend their leisure time by modern technologies. Thus, they spend their leisure time to look up satellite programs and use of the internet. This research has done for sociological consideration of the globalization of communications (internet  & satellite) on leisure t...

متن کامل

Efficient implementation of Private Information Retrieval protocols

A vast amount of today’s Internet users’ on line activities consists of queries to various types of databases. From traditional search engines to modern cloud based services, a person’s everyday queries over a period of time on various data sources, will leave a trail visible to the query processor, which can reveal significant and possibly sensitive information about her. Private Information R...

متن کامل

A Survey of Selected Evolutionary Computing Methods in Information Security ( May 2006 )

Recent studies in the subset of evolutionary computing known as genetic algorithms involving multiobjective optimization strategies can assist in solving challenges in information security. This paper summarizes the latest evolutionary computing research into a coherent starting point for those unfamiliar with the field. In particular, the areas of genetic algorithms and genetic programming und...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004