Error message

  • Notice: Undefined offset: 223 in user_node_load() (line 3697 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Trying to get property 'name' of non-object in user_node_load() (line 3697 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Undefined offset: 223 in user_node_load() (line 3698 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Trying to get property 'picture' of non-object in user_node_load() (line 3698 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Undefined offset: 223 in user_node_load() (line 3699 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Trying to get property 'data' of non-object in user_node_load() (line 3699 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Undefined offset: 223 in user_node_load() (line 3697 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Trying to get property 'name' of non-object in user_node_load() (line 3697 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Undefined offset: 223 in user_node_load() (line 3698 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Trying to get property 'picture' of non-object in user_node_load() (line 3698 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Undefined offset: 223 in user_node_load() (line 3699 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Trying to get property 'data' of non-object in user_node_load() (line 3699 of /home/tcipgpro/public_html/modules/user/user.module).

Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees (Extended Version)

Lee, A. J., Minami, K., Winslett, M.
Citation:

University of Illinois at Urbana-Champaign Department of Computer Science Technical Report No. UIUCDCS-R-2007-2839, April 2007.

Visit Publisher Online Entry:
Abstract:

In distributed proof construction systems, information release policies can make it unlikely that any single node in the system is aware of the complete structure of any particular proof tree. This property makes it difficult for queriers to determine whether the proofs constructed using these protocols sampled a consistent snapshot of the system state; this has previously been shown to have dire consequences in decentralized authorization systems. Unfortunately, the consistency enforcement solutions presented in previous work were designed for systems in which only information encoded in certificates issued by certificate authorities is used during the decision-making process. Further, they assume that each piece of certified evidence used during proof construction is available to the decision-making node at runtime. In this paper, we generalize these previous results and present lightweight mechanisms through which consistency constraints can be enforced in proof systems in which the full details of a proof may be unavailable to the querier and the existence of certificate authorities for certifying evidence is unlikely; these types of distributed proof systems are likely candidates for use in pervasive computing and sensor network environments. We present modifications to one such distributed proof system that enable two types of consistency constraints to be enforced while still respecting the same confidentiality and integrity policies as the original proof system. Further, we present the details of a performance analysis conducted to illustrate the modest overheads (less than 30%) of consistency enforcement on distributed proof construction.

Publication Status:
Published
Publication Type:
Technical Report
Publication Date:
04/01/2007
Copyright Notice:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

  1. The following copyright notice applies to all of the above items that appear in IEEE publications: "Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE."

  2. The following copyright notice applies to all of the above items that appear in ACM publications: "© ACM, effective the year of publication shown in the bibliographic information. This file is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in the journal or proceedings indicated in the bibliographic data for each item."

  3. The following copyright notice applies to all of the above items that appear in IFAC publications: "Document is being reproduced under permission of the Copyright Holder. Use or reproduction of the Document is for informational or personal use only."