TY - GEN
T1 - Automaton segmentation
T2 - 14th ACM Conference on Computer and Communications Security, CCS'07
AU - Li, Fengjun
AU - Luo, Bo
AU - Liu, Peng
AU - Lee, Dongwon
AU - Chu, Chao Hsien
PY - 2007
Y1 - 2007
N2 - A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the data server(s). Many existing information brokering systems adopt server side access control deployment and honest assumptions on brokers. However, little attention has been drawn on privacy of data and metadata stored and exchanged within DIBS. In this paper, we address privacy-preserving information sharing via on-demand information access. We propose a flexible and scalable system using a broker-coordinator overlay network. Through an innovative automaton segmentation scheme, distributed access control enforcement, and query segment encryption, our system integrates security enforcement and query forwarding while preserving system-wide privacy. We present the automaton segmentation approach, analyze privacy preservation in details, and finally examine the end-to-end performance and scalability through experiments and analysis.
AB - A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the data server(s). Many existing information brokering systems adopt server side access control deployment and honest assumptions on brokers. However, little attention has been drawn on privacy of data and metadata stored and exchanged within DIBS. In this paper, we address privacy-preserving information sharing via on-demand information access. We propose a flexible and scalable system using a broker-coordinator overlay network. Through an innovative automaton segmentation scheme, distributed access control enforcement, and query segment encryption, our system integrates security enforcement and query forwarding while preserving system-wide privacy. We present the automaton segmentation approach, analyze privacy preservation in details, and finally examine the end-to-end performance and scalability through experiments and analysis.
UR - http://www.scopus.com/inward/record.url?scp=77952376569&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77952376569&partnerID=8YFLogxK
U2 - 10.1145/1315245.1315308
DO - 10.1145/1315245.1315308
M3 - Conference contribution
AN - SCOPUS:77952376569
SN - 9781595937032
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 508
EP - 518
BT - CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security
Y2 - 29 October 2007 through 2 November 2007
ER -