Privacy-Preserving Trust Management for Unwanted Traffic Control

Tutkimustuotos: Lehtiartikkelivertaisarvioitu

Standard

Harvard

APA

Vancouver

Author

Bibtex - Lataa

@article{4a24b9d949e041ad984a13841a7f0d20,
title = "Privacy-Preserving Trust Management for Unwanted Traffic Control",
abstract = "The pervasive use of the Internet has caused an incredible growth of unwanted traffic, such as spam, malware and malicious intrusions. Controlling unwanted traffic based on trust and reputation mechanisms has invited significant and rigorous research in recent years. However, few of existing solutions concern and preserve the privacy of Internet hosts that report suspicious attacks. They cannot fulfill legal requirements, and are therefore impractical. In this paper, we propose a privacy-preserving trust management system for unwanted traffic control by applying homomorphic cryptosystem. The proposed system protects privacy, which is proved to be one-way and semantically secure against chosen-plaintext (IND-CPA) attacks if Computational Composite Residuosity Assumption (CCRA) holds. The system is implemented and its performance is extensively examined in terms of computation complexity, communication overhead and storage consumption. The result shows the effectiveness and practicality of our system to preserve the privacy of Internet hosts in the detection and control of unwanted traffic. (C) 2016 Elsevier B.V. All rights reserved.",
keywords = "Privacy preservation, Trust management, Unwanted traffic control, Intrusion detection",
author = "Lifang Zhang and Zheng Yan and Raimo Kantola",
year = "2017",
month = "7",
doi = "10.1016/j.future.2016.06.036",
language = "English",
volume = "72",
pages = "305--318",
journal = "Future Generation Computer Systems: the international journal of grid computing and escience",
issn = "0167-739X",

}

RIS - Lataa

TY - JOUR

T1 - Privacy-Preserving Trust Management for Unwanted Traffic Control

AU - Zhang, Lifang

AU - Yan, Zheng

AU - Kantola, Raimo

PY - 2017/7

Y1 - 2017/7

N2 - The pervasive use of the Internet has caused an incredible growth of unwanted traffic, such as spam, malware and malicious intrusions. Controlling unwanted traffic based on trust and reputation mechanisms has invited significant and rigorous research in recent years. However, few of existing solutions concern and preserve the privacy of Internet hosts that report suspicious attacks. They cannot fulfill legal requirements, and are therefore impractical. In this paper, we propose a privacy-preserving trust management system for unwanted traffic control by applying homomorphic cryptosystem. The proposed system protects privacy, which is proved to be one-way and semantically secure against chosen-plaintext (IND-CPA) attacks if Computational Composite Residuosity Assumption (CCRA) holds. The system is implemented and its performance is extensively examined in terms of computation complexity, communication overhead and storage consumption. The result shows the effectiveness and practicality of our system to preserve the privacy of Internet hosts in the detection and control of unwanted traffic. (C) 2016 Elsevier B.V. All rights reserved.

AB - The pervasive use of the Internet has caused an incredible growth of unwanted traffic, such as spam, malware and malicious intrusions. Controlling unwanted traffic based on trust and reputation mechanisms has invited significant and rigorous research in recent years. However, few of existing solutions concern and preserve the privacy of Internet hosts that report suspicious attacks. They cannot fulfill legal requirements, and are therefore impractical. In this paper, we propose a privacy-preserving trust management system for unwanted traffic control by applying homomorphic cryptosystem. The proposed system protects privacy, which is proved to be one-way and semantically secure against chosen-plaintext (IND-CPA) attacks if Computational Composite Residuosity Assumption (CCRA) holds. The system is implemented and its performance is extensively examined in terms of computation complexity, communication overhead and storage consumption. The result shows the effectiveness and practicality of our system to preserve the privacy of Internet hosts in the detection and control of unwanted traffic. (C) 2016 Elsevier B.V. All rights reserved.

KW - Privacy preservation

KW - Trust management

KW - Unwanted traffic control

KW - Intrusion detection

UR - http://www.sciencedirect.com/science/article/pii/S0167739X16302308

U2 - 10.1016/j.future.2016.06.036

DO - 10.1016/j.future.2016.06.036

M3 - Article

VL - 72

SP - 305

EP - 318

JO - Future Generation Computer Systems: the international journal of grid computing and escience

JF - Future Generation Computer Systems: the international journal of grid computing and escience

SN - 0167-739X

ER -

ID: 8670825