Skip to main content

Dynamic Policy Adaptation for Collaborative Groups

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

  • 3445 Accesses

Abstract

Dynamic collaborative peer groups generally have constantly changing application requirements and varied security requirements, and require a secure and reliable group communication. Self-organizing groups like f/oss motivate the need for dynamic multi-level access control. Currently there are some integrated solutions for secure group communication, but very few allow dynamic multi-level access control based on trust. We propose a framework for collaborative groups which integrates authentication, admission control, policy based access control, adaptive trust and key management. Our model permits peers to regulate their own behavior by deploying access control policies dynamically based on the behavior and trust level of peers in the group and the current group composition. Peers can collaboratively modify policies governing their level. Our trust metric is a tunable metric based on context specific attributes. Functionality of members in a group is also dynamic and the group can dynamically prioritise requests for join. We tested the behavior of groups under different application scenario by implementing our framework in overlay simulator peersim integrated with Prolog. Our experiments show that dynamic polices based on the adaptive trust and changing group composition lead to better group efficiency as compared to static access control policies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, Y., Mazzocchi, D., Tsudik, G.: Admission control in peer groups. In: Proceedings of the Second IEEE International Symposium on Network Computing and Applications, April 16-18, p. 131 (2003)

    Google Scholar 

  2. Saxena, N., Tsudik, G.: Admission Control in Peer-to- Peer: Design and Performance Evaluation. In: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN (2003)

    Google Scholar 

  3. Rotaru, C.N., Li, N.: A Framework for Role Based Access control in Group Communication Systems. In: IEEE Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, PDCS (2004)

    Google Scholar 

  4. Zhang, Y., Li, X., Huai, J., Liu, Y.: Access control in Peer to Peer collaborative Systems. In: ICDCSW 2005, IEEE-2005 (2005)

    Google Scholar 

  5. Tran, H., Hitchens, M., Varadharajan, V., Watters, P.: A trust based access control framework for P2P file sharing systems. In: Proceedings of the 38th Hawaii International Conference on Systems Sciences (2005)

    Google Scholar 

  6. Repantis, T., Kalogeraki, V.: Decentralized Trust Management for AdHoc PeertoPeer Networks. In: MPAC, November 27-December 1. ACM, New York (2006)

    Google Scholar 

  7. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: Eigenrep: Reputation management in p2p networks. In: Proc. of 12th International WWW Conference, pp. 640–651 (2003)

    Google Scholar 

  8. Chatterjee, M., Sivakumar, G., Bernard, M.: Dynamic Policy Based Model for Trust Based Access Control in P2P Applications. In: IEEE International Conference on Communications 2009, ICC 2009, Dresden, Germany, June 14-18, pp. 1–5 (2009)

    Google Scholar 

  9. Xiong, L., Liu, L.: A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities. In: Proceedings of the Fourth ACM Conference on Electronic Commerce, San Diego, CA, USA, June 09-12, pp. 228–229 (2003)

    Google Scholar 

  10. Xiong, L., Liu, L.: PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge And Data Engineering 16(7) (July 2004)

    Google Scholar 

  11. Lai, K., Feldman, M., et al.: Incentives for Cooperation in Peer-to-Peer Networks. In: Proceedings of the Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, June 5-6 (2003)

    Google Scholar 

  12. PeerSim Simulator Documentation, http://peersim.sourceforge.net/

  13. Becker, M.Y., Sewell, P.: Cassandra: Flexible trust management, applied to electronic health records. In: 17th IEEE Computer Security Foundations Workshop (CSFW), pp. 139–154 (2004)

    Google Scholar 

  14. Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder policy specification language. In: International Workshop on Policies for Distributed Systems and Networks, pp. 18–38 (2001)

    Google Scholar 

  15. Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: security analysis in trust management. Journal of the ACM 52(3), 474–514 (2005)

    Article  MathSciNet  Google Scholar 

  16. Sasturkar, A., Yang, P., Stoller, S.D., Ramakrishnan, C.R.: Policy analysis for administrative role based access control. In: Workshop on Computer Security Foundations, pp. 124–138 (2006)

    Google Scholar 

  17. Hezberg, A., Mass, Y., Michaeli, J., Ravid, Y., Naor, D.: Access Control Meets Public Key Infrastructure. In: Proc. 2000 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 2–14 (2000)

    Google Scholar 

  18. Dougherty, D., Fisler, K., Krishnamurti, S.: Specifying and reasoning about Dynamic Access control Policies. In: Third International Joint Conference on Automated Reasoning, IJCAR 2006, pp. 632–646 (2006)

    Google Scholar 

  19. Kim, Y., Perrig, A., Tsudik, G.: Tree-Based Group Key Agreement. ACM Transactions on Information and System Security 7(1), 60–96 (2004)

    Article  Google Scholar 

  20. Prolog, http://en.wikipedia.org/wiki/Prolog

  21. F/OSS Documentation, http://foss.in

  22. Amir, Y., Nita-Rotaru, C., Stanton, J., Tsudik, G.: Secure Spread: An Integrated Architecture for Secure Group Communication. IEEE Transactions on Dependable and Secure Computing 2(3) (July-September 2005)

    Google Scholar 

  23. Agarwal, D.A., Chevassut, O., Thompson, M.R., Tsudik, G.: An Integrated Solution for Secure Group Communication in Wide-Area Networks. In: Proceedings of the 6th IEEE Symposium on Computers and Communications, Hammamet, Tunisia, July 3-5, pp. 22–28 (2001)

    Google Scholar 

  24. Scacchi, W.: Free/Open Source Software Development Practices in the Computer Game Community, Institute for Software Research. University of California, Technical Report (April 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chatterjee, M., Sivakumar, G. (2010). Dynamic Policy Adaptation for Collaborative Groups. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics