A Scalable and Intrusion-tolerant Digital Time-stamping System

被引:2
|
作者
Tulone, Daniela [1 ]
机构
[1] Univ Pisa, I-56100 Pisa, Italy
关键词
D O I
10.1109/ICC.2006.255122
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure digital time-stamps play a crucial role in many applications that rely on the correctness of time-sensitive information. Well-known time-stamping systems are based on linking schemes which provide a relative temporal order by linking requests together. Unfortunately, these schemes do not scale well to large volume of requests, and have coarse granularity and high latency. Therefore, they are unsuitable for very large and dynamic systems, or applications requiring fine-grained and short-lived timestamps, or timeliness, such as stock trading, e-auctions, financial applications, aggregation of real-time sensitive information, and temporal access control. We propose a different scheme, based on real-time timestamps, which overcomes those drawbacks and leads to a performance enhancement. Our time-stamping system is intrusion-tolerant and it is based on a novel robust time service suitable for very large populations, on a robust threshold signature scheme, and on quorum system techniques. We prove its correctness and liveness, and compare its computational and communication complexity to the complexity of tree-based linking scheme. Finally, we show how the fine-granularity, improved scalability and efficiency of our scheme make it particularly suitable to those applications mentioned above, and also to mobile e-commerce.
引用
收藏
页码:2357 / 2363
页数:7
相关论文
共 50 条
  • [1] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [2] THE NEED FOR DIGITAL TIME-STAMPING
    HABER, S
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1993, 206 : 46 - CINF
  • [3] A survey on intrusion-tolerant system
    Yoon, H. (hyoon@nslab.kaist.ac.kr), 1600, Korean Institute of Information Scientists and Engineers (07):
  • [4] A time-stamping protocol for digital watermarking
    Hwang, MS
    Hwang, KF
    Chang, CC
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1276 - 1284
  • [5] An intrusion-tolerant password authentication system
    Wang, XH
    Heydari, MH
    Lin, H
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 110 - 118
  • [6] A Comparison of Intrusion-Tolerant System Architectures
    Nguyen, Quyen L.
    Sood, Arun
    IEEE SECURITY & PRIVACY, 2011, 9 (04) : 24 - 31
  • [7] Intrusion-tolerant enclaves
    Dutertre, B
    Crettaz, V
    Stavridou, V
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
  • [8] Probabilistic validation of an intrusion-tolerant replication system
    Singh, S
    Cukier, M
    Sanders, WH
    2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 615 - 624
  • [9] BackupIT: An Intrusion-Tolerant Cooperative Backup System
    Loest, Sergio
    Madruga, Marcelo
    Maziero, Carlos
    Lung, Lau
    PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 724 - +
  • [10] SITAR: A scalable intrusion-tolerant architecture for distributed services - A technology summary
    Wang, FY
    Upppalli, R
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 153 - 155