TY - GEN
T1 - A fully decentralized data usage control enforcement infrastructure
AU - Kelbert, Florian
AU - Pretschner, Alexander
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2015.
PY - 2015
Y1 - 2015
N2 - Distributed data usage control enables data owners to constrain how their data is used by remote entities. However, many data usage policies refer to events happening within several distributed systems, e.g. “at each point in time at most two clerks might have a local copy of this contract”, or “a contract must be approved by at least two clerks before it is sent to the customer”. While such policies can intuitively be enforced using a centralized infrastructure, major drawbacks are that such solutions constitute a single point of failure and that they are expected to cause heavy communication and performance overhead. Hence, we present the first fully decentralized infrastructure for the preventive enforcement of data usage policies. We provide a thorough evaluation of our infrastructure and show in which scenarios it is superior to a centralized approach.
AB - Distributed data usage control enables data owners to constrain how their data is used by remote entities. However, many data usage policies refer to events happening within several distributed systems, e.g. “at each point in time at most two clerks might have a local copy of this contract”, or “a contract must be approved by at least two clerks before it is sent to the customer”. While such policies can intuitively be enforced using a centralized infrastructure, major drawbacks are that such solutions constitute a single point of failure and that they are expected to cause heavy communication and performance overhead. Hence, we present the first fully decentralized infrastructure for the preventive enforcement of data usage policies. We provide a thorough evaluation of our infrastructure and show in which scenarios it is superior to a centralized approach.
UR - http://www.scopus.com/inward/record.url?scp=84955264427&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-28166-7_20
DO - 10.1007/978-3-319-28166-7_20
M3 - Conference contribution
AN - SCOPUS:84955264427
SN - 9783319281650
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 409
EP - 430
BT - Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, Revised Selected Papers
A2 - Malkin, Tal
A2 - Lewko, Allison Bishop
A2 - Kolesnikov, Vladimir
A2 - Polychronakis, Michalis
PB - Springer Verlag
T2 - 13th International Conference on Applied Cryptography and Network Security, ACNS 2015
Y2 - 2 June 2015 through 5 June 2015
ER -