A fully decentralized data usage control enforcement infrastructure

Florian Kelbert, Alexander Pretschner

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

23 Scopus citations

Abstract

Distributed data usage control enables data owners to constrain how their data is used by remote entities. However, many data usage policies refer to events happening within several distributed systems, e.g. “at each point in time at most two clerks might have a local copy of this contract”, or “a contract must be approved by at least two clerks before it is sent to the customer”. While such policies can intuitively be enforced using a centralized infrastructure, major drawbacks are that such solutions constitute a single point of failure and that they are expected to cause heavy communication and performance overhead. Hence, we present the first fully decentralized infrastructure for the preventive enforcement of data usage policies. We provide a thorough evaluation of our infrastructure and show in which scenarios it is superior to a centralized approach.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 13th International Conference, ACNS 2015, Revised Selected Papers
EditorsTal Malkin, Allison Bishop Lewko, Vladimir Kolesnikov, Michalis Polychronakis
PublisherSpringer Verlag
Pages409-430
Number of pages22
ISBN (Print)9783319281650
DOIs
StatePublished - 2015
Event13th International Conference on Applied Cryptography and Network Security, ACNS 2015 - New York, United States
Duration: 2 Jun 20155 Jun 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9092
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference13th International Conference on Applied Cryptography and Network Security, ACNS 2015
Country/TerritoryUnited States
CityNew York
Period2/06/155/06/15

Fingerprint

Dive into the research topics of 'A fully decentralized data usage control enforcement infrastructure'. Together they form a unique fingerprint.

Cite this