2015
DOI: 10.1016/j.csi.2015.04.007
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-based authorization for structured Peer-to-Peer (P2P) networks

Abstract: We present the deficiencies of traditional identity-based authorization models in structured Peer-to-Peer (P2P) networks where users' Public Key Certificates (PKCs) represent two roles, authentication and authorization, and the access to the network resources is controlled by Access Control Lists (ACLs). With these deficiencies in mind, we propose a complete new framework for authorization in structured P2P networks based on Attribute Certificates (ACs) and a fully distributed certificate revocation system. We… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Such approaches make use of various standards, like SAML and OpenID, in order to provide Single-Sign On (SSO) authentication between clouds. As for peer-to-peer computing, there are also several mechanisms that provide mutual authentication without having to connect to a central authentication server [76]. As the design of these approaches is compatible with the underlying infrastructures of edge paradigms, all these approaches might be adapted to handle the authentication of edge data centers that belong to different trust domains.…”
Section: Identity and Authenticationmentioning
confidence: 99%
“…Such approaches make use of various standards, like SAML and OpenID, in order to provide Single-Sign On (SSO) authentication between clouds. As for peer-to-peer computing, there are also several mechanisms that provide mutual authentication without having to connect to a central authentication server [76]. As the design of these approaches is compatible with the underlying infrastructures of edge paradigms, all these approaches might be adapted to handle the authentication of edge data centers that belong to different trust domains.…”
Section: Identity and Authenticationmentioning
confidence: 99%
“…And the single sign-on (SSO) authentication mechanism is expected to be applied to identity authentication between multiple trust domains [49]. Reference [50] designed an attribute-based authentication and authorization framework for structured P2P networks. The framework uses attribute certificates and distributed certificate revocation systems to replace the traditional P2P network's public key certificates and access control list authentication mechanisms.…”
Section: B: Cross-domain Authenticationmentioning
confidence: 99%
“…(2) Integrity: It ensures that data are transmitted correctly and consistently to the authorized user(s) without any observable data changes. Data integration research in edge computing should focus on four functional elements: batch auditing [82] , dynamic auditing [83] , privacy auditing [84] , and low complexity [85] .…”
Section: Architectural Requirements Of Edge-based Healthcare Systemsmentioning
confidence: 99%