A Scalable and Intrusion-tolerant Digital Time-stamping System

被引:2
|
作者
Tulone, Daniela [1 ]
机构
[1] Univ Pisa, I-56100 Pisa, Italy
关键词
D O I
10.1109/ICC.2006.255122
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure digital time-stamps play a crucial role in many applications that rely on the correctness of time-sensitive information. Well-known time-stamping systems are based on linking schemes which provide a relative temporal order by linking requests together. Unfortunately, these schemes do not scale well to large volume of requests, and have coarse granularity and high latency. Therefore, they are unsuitable for very large and dynamic systems, or applications requiring fine-grained and short-lived timestamps, or timeliness, such as stock trading, e-auctions, financial applications, aggregation of real-time sensitive information, and temporal access control. We propose a different scheme, based on real-time timestamps, which overcomes those drawbacks and leads to a performance enhancement. Our time-stamping system is intrusion-tolerant and it is based on a novel robust time service suitable for very large populations, on a robust threshold signature scheme, and on quorum system techniques. We prove its correctness and liveness, and compare its computational and communication complexity to the complexity of tree-based linking scheme. Finally, we show how the fine-granularity, improved scalability and efficiency of our scheme make it particularly suitable to those applications mentioned above, and also to mobile e-commerce.
引用
收藏
页码:2357 / 2363
页数:7
相关论文
共 50 条
  • [21] A two-level time-stamping system
    Gabillon, A
    Byun, J
    TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 139 - 149
  • [22] Intrusion-tolerant architectures:: Concepts and design
    Veríssimo, PE
    Neves, NF
    Correia, MP
    ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
  • [23] An analysis of detailed electronic time-stamping using digital TV
    Morigaki, T
    Matsuura, K
    Sudo, O
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 277 - 284
  • [24] An architecture for an adaptive intrusion-tolerant server
    Valdes, A
    Almgren, M
    Cheung, S
    Deswarte, Y
    Dutertre, B
    Levy, J
    Saïdi, H
    Stavridou, V
    Uribe, TE
    SECURITY PROTOCOLS, 2004, 2845 : 158 - 177
  • [25] Bounded concurrent time-stamping
    Dolev, D
    Shavit, N
    SIAM JOURNAL ON COMPUTING, 1997, 26 (02) : 418 - 455
  • [26] Design of a Lightweight Intrusion-Tolerant System for Highly Available Servers
    Okamoto, Takeshi
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 2319 - 2327
  • [27] Secure intrusion-tolerant replication on the Internet
    Cachin, C
    Poritz, JA
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
  • [28] Intrusion-tolerant group management in enclaves
    Dutertre, B
    Saïdi, H
    Stavridou, V
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
  • [29] Time-Stamping Authority Grid
    Nishikawa, T.
    Matsuoka, S.
    CCGRID 2008: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, VOLS 1 AND 2, PROCEEDINGS, 2008, : 98 - 105
  • [30] Randomized intrusion-tolerant asynchronous services
    Moniz, Henrique
    Neves, Nuno Ferreira
    Correia, Miguel
    Verissimo, Paulo
    DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 568 - 577