New paradigms for Internet architecture evolution towards a data dissemination oriented have been largely proposed. We review the related literature and define a Secure Pseudonymous Access, an access protocol suitable for every dissemination network. The main goal is to couple QoS constraints in terms of data reliability and secure access with easiness of service use, by removing most of administrative and user initialization burdens. The key issue is user traceability, i.e. the possibility to tie together (in a provable way) actions performed by the same user entity, along with pieces of data uploaded into the network to be shared with others. Signalling procedures of the Secure Pseudonymous Access are defined and security issues are discussed. Finally we describe a test bed implementation of SPA and give an estimate of procedure complexity and servers load.
Secure Pseudonymous Access (SPA) to Overlay Data Dissemination Network / Listanti, Marco; Anna Del, Grosso; Baiocchi, Andrea; M., Dambrosio. - STAMPA. - unico:(2010), pp. 31-41. (Intervento presentato al convegno 21st International Tyrrhenian Workshop on Digital Communications tenutosi a Island of Ponza (Italy) nel September 6-8, 2010) [10.1007/978-88-470-1818-1_3].
Secure Pseudonymous Access (SPA) to Overlay Data Dissemination Network
LISTANTI, Marco;BAIOCCHI, Andrea;
2010
Abstract
New paradigms for Internet architecture evolution towards a data dissemination oriented have been largely proposed. We review the related literature and define a Secure Pseudonymous Access, an access protocol suitable for every dissemination network. The main goal is to couple QoS constraints in terms of data reliability and secure access with easiness of service use, by removing most of administrative and user initialization burdens. The key issue is user traceability, i.e. the possibility to tie together (in a provable way) actions performed by the same user entity, along with pieces of data uploaded into the network to be shared with others. Signalling procedures of the Secure Pseudonymous Access are defined and security issues are discussed. Finally we describe a test bed implementation of SPA and give an estimate of procedure complexity and servers load.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.