Triumf: the Trusted Reliable Middleware Samcast: a Secure and Authenticated Multicast Protocol

نویسنده

  • Waseem Ahmad
چکیده

If success of outsourcing and popularity of Web 2.0 are anything to go by, collaborations are highly desired both in business and social communities. From large scale organizations to teen-agers, every one seems to be interested in sharing her resources (be it computing power or data) with her peers provided it is beneficial to her personal goals. This collaboration process is supposed to be inherently trustworthy in order to be successful in attaining its intended goals. To take the success of this collaboration to maximum possible limits we need to guarantee that privacy and security of collaborating partners never get compromised. In my view, problem of privacy protection has to be dealt on three fronts. • Technical Approach: Novel technical solutions involving Cryptographic Secure Multiparty Computation Protocols, Statistical Data Analysis techniques, Intelligent User Interfaces and Social Network Analysis algorithms are required to provide an infrastructure upon which privacy preserving applications can be built. • Legislative Support: State and Federal Laws to force organizations to employ technical solutions to make sure that the privacy of their customers never get compromised. • Social Approach: Apart from technical and legislative support, people themselves need to be educated about the possible implications of the use of technology. Most of the users don’t understand the legal language behind privacy policies stated by the service providers. They need to be told in more user friendly ways as to how their privacy can get effected by the use of a specific service and how privacy leakage can be minimized. My research is aimed at making contributions to the technological advancements for privacy and security protection. I proposed a Middleware architecture[4], referred to as TRIUMF, that facilitates development of privacy preserving applications specially in context of distributed collaborations 1.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TRIUMF: A Trusted Middleware for Fault-tolerant Secure Collaborative Computing

A collaboration is an activity conducted by two or more parties to achieve a common goal. Business collaborations are becoming an essential part of emerging business models. Organizations, however, are unable to reap true benefits of collaborations because of their security and privacy concerns. TRIUMF, the Trusted Middleware for Fault-tolerant secure collaborative computing, is aimed at enabli...

متن کامل

Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group

Protocols for group key exchange are cryptographic algorithms that describe how a group of parties communicating over a public network can come up with a common secret key. Due to their critical role in building secure multicast channels, a number of group key exchange protocols have been proposed over the years for a variety of settings. In this work, we present a new protocol for password-aut...

متن کامل

ارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا

The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases,   the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007