Tamper-Evident Complex Genomic Networks
نویسندگان
چکیده
Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between individuals thus implies losing relationship information (E.g. father or son etc.). There currently exists a considerably serious problem in the current approach to storing network data. Simply stated, network data is not tamper-evident. In other words, if some links or nodes were changed/removed/added by a malicious attacker, it would be impossible for the administrator to detect such changes. While, in the current age of social media networks, change in node characteristics and links can be bad in terms of relationships, in the case of networks for storing personal genomes, the results could be truly devastating. Here we present a scheme for building tamper-evident networks using a combination of Cryptographic and Ego-based Network analytic methods. Using actual published data-sets, we also demonstrate the utility and validity of the scheme besides demonstrating its working in various possible scenarios of usage. Results from the extensive experiments demonstrate the validity of the proposed approach.
منابع مشابه
Auditable Privacy: On Tamper-Evident Mix Networks
We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce herein. Our tamper-evident mix network is a type of re-encryption mixnet in which a se...
متن کاملA Theory of Integrating Tamper Evidence with Stabilization
We propose the notion of tamper-evident stabilization –that combines stabilization with the concept of tamper evidence– for computing systems. On the first glance, these notions are contradictory; stabilization requires that eventually the system functionality is fully restored whereas tamper evidence requires that the system functionality is permanently degraded in the event of tampering. Tamp...
متن کاملEfficient Tamper-Evident Data Structures for Untrusted Servers
Efficient Tamper-Evident Data Structures for Untrusted Servers
متن کاملSeveral Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices
Following both theoretical and practical arguments, we construct UC-secure bit-commitment protocols that place their strength on the sender’s side and are built using tamper-evident devices, e.g., a type of distinguishable, sealed envelopes. We show that by using a second formalisation of tamper-evident distinguishable envelopes we can attain better security guarantees, i.e., EUC-security. We s...
متن کاملUsing Model-Checking to Reveal a Vulnerability of Tamper-Evident Pairing
Wi-Fi Protected Setup is an attempt to simplify configuration of security settings for Wi-Fi networks. It offers, among other methods, Push-Button Configuration (PBC) for devices with a limited userinterface. There are however some security issues in PBC. A solution to these issues was proposed in the form of Tamper-Evident Pairing (TEP). TEP is based on the Tamper-Evident Announcement (TEA), i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1708.05926 شماره
صفحات -
تاریخ انتشار 2017