Abstract
Trustworthiness, in terms of resilience to failures and malicious activities, is a key issue in today’s data networks; its provision is very challenging due to the large geographical scale of network accidents (e.g., routing accidents and software faults), as well as from the presence of distributed and coordinated inter-domain infrastructures specifically set up for malicious activities (e.g., botnets). This scenario is even worsened by the extremely high volume of traffic flowing across the Internet which makes traditional intra-domain monitoring systems based on centralized storage and post-processing analysis inadequate. In addition, any approach designed to overcome such limitations will ultimately have to handle massive amounts of data about users; this creates serious privacy concerns, also surrounded by legal implications [6]. On the other hand, cooperative cross-domain monitoring mechanisms that involve data exchange among the collaborating partners, create the danger of disclosing business-critical information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Berger, A., Cesareo, J., D’Alconzo, A.: Collaborative network defense with minimum disclosure. In: 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011 (2011)
Bianchi, G., Rajabi, H., Sgorlon, M.: Enabling conditional cross-domain data sharing via a cryptographic approach. In: 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, IMSAA (2011)
Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. In: 19th USENIX Security Symposium (2010)
Huici, F., Pietro, A.D., Trammell, B., Hidalgo, J.M.G., Ruiz, D.M., d’Heureuse, N.: Blockmon: A high-performance composable network traffic measurement system. In: Posters and Demos Session at ACM SIGCOMM 2012. ACM (to appear, 2012)
Koukovini, M.N., Papagiannakopoulou, E.I., Lioudakis, G.V., Kaklamani, D.I., Venieris, I.S.: A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol. 7122, pp. 295–302. Springer, Heidelberg (2012)
Lioudakis, G.V., Gaudino, F., Boschi, E., Bianchi, G., Kaklamani, D.I., Venieris, I.S.: Legislation-aware privacy protection in passive network monitoring. In: Portela, I.M., Cruz-Cunha, M.M. (eds.) Information Communication Technology Law, Protection and Access Rights: Global Approaches and Issues. IGI Global (2010)
Papagiannakopoulou, E.I., Koukovini, M.N., Lioudakis, G.V., Garcia-Alfaro, J., Kaklamani, D.I., Venieris, I.S.: A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress. In: Garcia-Alfaro, J., Lafourcade, P. (eds.) FPS 2011. LNCS, vol. 6888, pp. 208–217. Springer, Heidelberg (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rao, S. (2012). Decentralized, Cooperative, Secure and Privacy – Aware Monitoring for Trustworthiness. In: Fischer-Hübner, S., Katsikas, S., Quirchmayr, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2012. Lecture Notes in Computer Science, vol 7449. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32287-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-32287-7_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32286-0
Online ISBN: 978-3-642-32287-7
eBook Packages: Computer ScienceComputer Science (R0)