A Scalable and Intrusion-tolerant Digital Time-stamping System

被引:2
|
作者
Tulone, Daniela [1 ]
机构
[1] Univ Pisa, I-56100 Pisa, Italy
关键词
D O I
10.1109/ICC.2006.255122
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure digital time-stamps play a crucial role in many applications that rely on the correctness of time-sensitive information. Well-known time-stamping systems are based on linking schemes which provide a relative temporal order by linking requests together. Unfortunately, these schemes do not scale well to large volume of requests, and have coarse granularity and high latency. Therefore, they are unsuitable for very large and dynamic systems, or applications requiring fine-grained and short-lived timestamps, or timeliness, such as stock trading, e-auctions, financial applications, aggregation of real-time sensitive information, and temporal access control. We propose a different scheme, based on real-time timestamps, which overcomes those drawbacks and leads to a performance enhancement. Our time-stamping system is intrusion-tolerant and it is based on a novel robust time service suitable for very large populations, on a robust threshold signature scheme, and on quorum system techniques. We prove its correctness and liveness, and compare its computational and communication complexity to the complexity of tree-based linking scheme. Finally, we show how the fine-granularity, improved scalability and efficiency of our scheme make it particularly suitable to those applications mentioned above, and also to mobile e-commerce.
引用
收藏
页码:2357 / 2363
页数:7
相关论文
共 50 条
  • [11] A Network Intrusion-Tolerant System Based on Adaptive Algorithm
    Zhao, Hui
    Zheng, Shanhong
    Li, Wanlong
    Zhang, LiJuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2890 - 2893
  • [12] Adaptation policies for web server intrusion-tolerant system
    Im, EG
    In, HP
    Choi, DS
    Song, YH
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (08) : 3462 - 3465
  • [13] Intrusion-Tolerant Autonomous Driving
    Volp, Marcus
    Esteves-Verissimo, Paulo
    2018 IEEE 21ST INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2018), 2018, : 130 - 133
  • [14] Intrusion-tolerant based survivable model of database system
    Zhu, JM
    Wang, C
    Ma, JF
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 481 - 484
  • [15] Experiences with building an intrusion-tolerant group communication system
    Ramasamy, HariGovind V.
    Pandey, Prashant
    Cukier, Michel
    Sanders, William H.
    SOFTWARE-PRACTICE & EXPERIENCE, 2008, 38 (06): : 639 - 666
  • [16] Proactive Recovery in Intrusion-Tolerant System Based on TTCB
    Zhou Hua
    Zhou Hai-jun
    Ma Jian-feng
    2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 799 - 802
  • [17] Practical Intrusion-Tolerant Networks
    Obenshain, Daniel
    Tantillo, Thomas
    Babay, Amy
    Schultz, John
    Newell, Andrew
    Hoque, Md. Endadul
    Amir, Yair
    Nita-Rotaru, Cristina
    PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 45 - 56
  • [18] Distributed group membership algorithm in intrusion-tolerant system
    Yin, LH
    Fang, BX
    Yu, XZ
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 511 - 515
  • [19] Intrusion-tolerant system design for web server survivability
    Choi, DS
    Im, EG
    Lee, CW
    INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 124 - 134
  • [20] An intrusion-tolerant mechanism for intrusion detection systems
    Kuang, Liwei
    Zulkernine, Mohammad
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +