ABSTRACT
In trust negotiation approaches to authorization, previously unacquainted entities establish trust in one another gradually via the bilateral and iterative exchange of policies and digital credentials. Although this affords resource providers with an expressive means of access control for open systems, the trust negotiation process incurs non-trivial computational and communications costs. In this paper, we propose Receipt-Mode Trust Negotiation (RMTN) as a means of mitigating the performance penalties on servers that use trust negotiation. RMTN provides a means of off-loading the majority of the trust negotiation process to delegated receipt-generating helper servers. RMTN ensures that helpers produce correct trust negotiation protocol receipts, and that the helpers are incapable of impersonating the resource server outside of the RMTN protocol. We describe an initial implementation of our RMTN protocol on a Linux testbed, discuss the security of this protocol, and present experimental results indicating that the receipt-mode protocol does indeed enhance the performance of resource servers that rely on trust negotiation approaches to authorization.
- Information technology - open systems interconnection - the directory: Public-key and attribute certificate frameworks, March 2000.Google Scholar
- Link aggregation (ieee 802.1ax), 2008. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4668665,.Google Scholar
- Y. Amir, R. Caudy, A. Munjal, T. Schlossnagle, and C. Tutu. N-way fail-over infrastructure for reliable servers and routers. In DSN, pages 403--, 2003.Google Scholar
- T. Aura, P. Nikander, and J. Leiwo. Dos-resistant authentication with client puzzles. Cambridge Security Protocols Workshop 2000, Apr. 2000. Google ScholarDigital Library
- M. Y. Becker and P. Sewell. Cassandra: Distributed access control policies with tunable expressiveness. In 5th IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. Google ScholarDigital Library
- E. Bertino, E. Ferrari, and A. C. Squicciarini. X -TNL: An XML-based language for trust negotiations. In Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY '03), 2003. Google ScholarDigital Library
- E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-x: A peer-to-peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering, 16(7):827--842, 2004. Google ScholarDigital Library
- P. Bonatti and P. Samarati. Regulating service access and information release on the web. In 7th ACM Conference on Computer and Communications Security, pages 134--143, 2000. Google ScholarDigital Library
- T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2, Aug. 2008.Google Scholar
- C. C. Fan. The raincore distributed session service for networking elements.Google Scholar
- A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. Proceedings of NDSS '99 (Networks and Distributed Security Systems), pages 151--165, 1999.Google Scholar
- A. J. Lee and M. Winslett. Towards and efficient and language-agnostic compliance checker for trust negotiation systems. In 3rd ACM Symposium on Information, Computer, and Communication Security (ASIACCS '08), Mar. 2008. Google ScholarDigital Library
- A. J. Lee, M. Winslett, and K. J. Perano. Trustbuilder2: A reconfigurable framework for trust negotiation. In Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2009), June 2009.Google Scholar
- N. Li and J. Mitchell. RT: A role-based trust-management framework. In Third DARPA Information Survivability Conference and Exposition, Apr. 2003.Google ScholarDigital Library
- W. Nejdl, D. Olmedilla, and M. Winslett. Peertrust: Automated trust negotiation for peers on the semantic web. In LDB Workshop on Secure Data Management (SDM), volume 3178 of Lecture Notes in Computer Science, pages 118--132, 2004.Google ScholarCross Ref
- T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons. Adaptive trust negotiation and access control. In 10th ACM Symposium on Access Control Models and Technologies, June 2005. Google ScholarDigital Library
- A. Squicciarini, E. Bertino, E. Ferrari, F. Paci, and B. Thuraisingham. Pp-trust-x: A system for privacy preserving trust negotiations, 2007.Google Scholar
- S. Tuecke, V. Welch, D. Engert, L. Pearlman, and M. Thompson. Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. RFC 3820 (Proposed Standard), June 2004.Google Scholar
- B. Waters, A. Juels, J. A. Halderman, and E. W. Felten. New client puzzle outsourcing techniques for DoS resistance. In Proceedings of the 11th ACM Conference on Computer and Communications Security, pages 246--256, Oct. 2004. Google ScholarDigital Library
- W. H. Winsborough and N. Li. Automated trust negotiation. In In DARPA Information Survivability Conference and Exposition, volume I, pages 88--102. IEEE Press, 2000.Google Scholar
- M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu. Negotiating trust on the web. IEEE Internet Computing, 6(6):30--37, Nov./Dec. 2002. Google ScholarDigital Library
- M. Winslett, C. Zhang, and P. A. Bonatti. PeerAccess: A logic for distributed authorization. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005), Nov. 2005. Google ScholarDigital Library
- T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation. ACM Transaction on Information and System Security (TISSEC), pages 1--42, February 2003. Google ScholarDigital Library
Index Terms
- Receipt-mode trust negotiation: efficient authorization through outsourced interactions
Recommendations
Protecting sensitive attributes in automated trust negotiation
WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic SocietyExchange of attribute credentials is a means to establish mutual trust between strangers that wish to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the flow of sensitive attributes during ...
A Security Log Based Trust Negotiation Model
CINC '09: Proceedings of the 2009 International Conference on Computational Intelligence and Natural Computing - Volume 02Trust Negotiation (TN) is an approach to establish trust relationship between strangers by disclosing iteratively credentials and access control policies. In open and distributed environment TN brings convenience in resource share, while it still has ...
Policy migration for sensitive credentials in trust negotiation
WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic societyTrust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, access control policies are associated with sensitive credentials to control ...
Comments