1
7/17/2019 Abstract http://slidepdf.com/reader/full/abstract-56907adc3932d 1/1 ABSTRACT  To facilitate extensive collaborations, today’s organizations raise increasing needs for information sharing via on-demand information access. Information Brokering System (IBS ato! a !eer-to-!eer overlay has been !ro!osed to s"!!ort information sharing among loosely federated data so"rces. It consists of diverse data servers and brokering com!onents, #hich hel! client $"eries to locate the data servers. %o#ever, many existing IBSs ado!t server side access control de!loyment and honest ass"m!tions on brokers, and shed little attention on !rivacy of data and metadata stored and exchanged #ithin the IBS.  In this article, #e st"dy the !roblem of !rivacy !rotection in information brokering !rocess. &e first give a formal !resentation of the threat models #ith a foc"s on t#o attacks' attrib"te-correlation attack and inference attack. Then, #e !ro!ose a broker-coordinator overlay, aa #ell as t#o schemes, a"tomaton segmentation scheme and $"ery segment encry!tion scheme, to share the sec"re $"ery ro"ting f"nction among a set of brokering servers. &ith com!rehensive analysis on !rivacy, endto- end !erformance, and scalability, #e sho# that the !ro!osed system can integrate sec"rity enforcement and $"ery ro"ting #hile !reserving system-#ide !rivacy #ith reasonable overhead.

Abstract

Embed Size (px)

DESCRIPTION

project

Citation preview

Page 1: Abstract

7/17/2019 Abstract

http://slidepdf.com/reader/full/abstract-56907adc3932d 1/1

ABSTRACT

 

To facilitate extensive collaborations, today’s organizations raise

increasing needs for information sharing via on-demand information

access. Information Brokering System (IBS ato! a !eer-to-!eer overlay

has been !ro!osed to s"!!ort information sharing among loosely

federated data so"rces. It consists of diverse data servers and brokering

com!onents, #hich hel! client $"eries to locate the data servers.

%o#ever, many existing IBSs ado!t server side access control

de!loyment and honest ass"m!tions on brokers, and shed little

attention on !rivacy of data and metadata stored and exchanged #ithin

the IBS.

 In this article, #e st"dy the !roblem of !rivacy !rotection in

information brokering !rocess. &e first give a formal !resentation of 

the threat models #ith a foc"s on t#o attacks' attrib"te-correlation

attack and inference attack. Then, #e !ro!ose a broker-coordinator

overlay, aa #ell as t#o schemes, a"tomaton segmentation scheme and

$"ery segment encry!tion scheme, to share the sec"re $"ery ro"ting

f"nction among a set of brokering servers. &ith com!rehensive analysis

on !rivacy, endto- end !erformance, and scalability, #e sho# that the

!ro!osed system can integrate sec"rity enforcement and $"ery ro"ting

#hile !reserving system-#ide !rivacy #ith reasonable overhead.