A survey of accountability in computer networks and distributed systems

Security in computer systems has been a major concern since the very beginning. Although security has been addressed in various aspects, accountability is one of the main facets of security that is lacking in today's computer systems. The ability not only to detect errors but also to find the responsible entity/entities for the failure is crucial. In this paper, we intend to provide a comprehensive investigation of the state-of-the-art accountability research issues in current information systems. Also, we study the various accountability tactics that are available and how each one of them contributes to providing strong accountability of different aspects. Finally, we examine the various merits and tradeoffs. Copyright © 2012 John Wiley & Sons, Ltd.

[1]  Guang Gong,et al.  On the (in)security of two Joint Encryption and Error Correction schemes , 2011, Int. J. Secur. Networks.

[2]  Andreas Haeberlen,et al.  NetReview: Detecting When Interdomain Routing Goes Wrong , 2009, NSDI.

[3]  Xiaohui Liang,et al.  ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.

[4]  Dawn Xiaodong Song,et al.  SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[5]  Siu-Ming Yiu,et al.  Exclusion-intersection encryption , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[6]  Dieter Gollmann,et al.  A fair non-repudiation protocol , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[7]  K. P. Subbalakshmi,et al.  KL-sense secure image steganography , 2011, Int. J. Secur. Networks.

[8]  Matthew N. O. Sadiku,et al.  An intrusion detection technique based on continuous binary communication channels , 2011, Int. J. Secur. Networks.

[9]  Daisuke Takahashi,et al.  Accountability using flow-net: design, implementation, and performance evaluation , 2012, Secur. Commun. Networks.

[10]  Sudhir Aggarwal,et al.  Incorporating accountability into internet email , 2009, SAC '09.

[11]  Alex C. Snoeren,et al.  Hash-based IP traceback , 2001, SIGCOMM '01.

[12]  Feifei Li,et al.  Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.

[13]  Scott Shenker,et al.  An Accountability Interface for the Internet , 2007 .

[14]  Heejo Lee,et al.  OMAP: One-Way Memory Attestation Protocol for Smart Meters , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.

[15]  XiaoYang,et al.  PeerReview re-evaluation for accountability in distributed systems or networks , 2012 .

[16]  Helen Nissenbaum,et al.  Computing and accountability , 1994, CACM.

[17]  Lawrence C. Paulson,et al.  Accountability protocols: Formalized and verified , 2006, TSEC.

[18]  Yang Xiao,et al.  PeerReview re-evaluation for accountability in distributed systems or networks , 2012, Int. J. Secur. Networks.

[19]  Dmitry Podkuiko,et al.  Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.

[20]  Moustafa Youssef,et al.  A source authentication scheme using network coding , 2011, Int. J. Secur. Networks.

[21]  Hrishikesh B. Acharya,et al.  Is That You? Authentication in a Network without Identities , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[22]  Jeffrey S. Chase,et al.  Strong accountability for network storage , 2007, TOS.

[23]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[24]  Larry L. Peterson,et al.  PlanetFlow: maintaining accountability for network services , 2006, OPSR.

[25]  Yang Xiao,et al.  P-Accountable Networked Systems , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[26]  J.E.R. Alves,et al.  Identification of energy theft and tampered meters using a central observer meter: a mathematical approach , 2003, 2003 IEEE PES Transmission and Distribution Conference and Exposition (IEEE Cat. No.03CH37495).

[27]  Yang Xiao,et al.  Accountability in smart grids , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[28]  P. Reiher,et al.  Building accountability into the future Internet , 2008, 2008 4th Workshop on Secure Network Protocols.

[29]  David R. Cheriton,et al.  Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks , 2003, ArXiv.

[30]  Katerina J. Argyraki,et al.  Loss and Delay Accountability for the Internet , 2007, 2007 IEEE International Conference on Network Protocols.

[31]  Radha Jagadeesan,et al.  Towards a Theory of Accountability and Audit , 2009, ESORICS.

[32]  Abdelrahman Desoky,et al.  Edustega: an Education-Centric Steganography methodology , 2011, Int. J. Secur. Networks.

[33]  Anne-Marie Kermarrec,et al.  LiFTinG: Lightweight Freerider-Tracking Protocol in Gossip , 2010 .

[34]  Craig A. Shue,et al.  Packet forwarding with source verification , 2008, Comput. Networks.

[35]  Chen Wang,et al.  A Collaborative Monitoring Mechanism for Making a Multitenant Platform Accountable , 2010, HotCloud.

[36]  Nick Feamster,et al.  Accountable internet protocol (aip) , 2008, SIGCOMM '08.

[37]  Vyas Sekar,et al.  Verifiable resource accounting for cloud computing services , 2011, CCSW '11.

[38]  E. Todeva Networks , 2007 .

[39]  Jie Wu,et al.  Friendship-based location privacy in Mobile Social Networks , 2011, Int. J. Secur. Networks.

[40]  Jingyuan Zhang,et al.  Hidden information in Microsoft Word , 2011, Int. J. Secur. Networks.

[41]  Shahram Latifi,et al.  Partial iris and recognition as a viable biometric scheme , 2011, Int. J. Secur. Networks.

[42]  Xin Liu,et al.  Passport: Secure and Adoptable Source Authentication , 2008, NSDI.

[43]  Prasant Mohapatra,et al.  Rendezvous based trust propagation to enhance distributed network security , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[44]  Craig Partridge,et al.  Single-packet IP traceback , 2002, TNET.

[45]  Anat Bremler-Barr,et al.  Spoofing prevention method , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[46]  Neeraj Jaggi,et al.  A three dimensional sender anonymity metric , 2011, Int. J. Secur. Networks.

[47]  Martín Abadi,et al.  Certified email with a light on-line trusted third party: design and implementation , 2002, WWW.

[48]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[49]  Yang Xiao,et al.  Accountable MapReduce in cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[50]  Kang G. Shin,et al.  IP easy-pass: a light-weight network-edge resource access control , 2005, IEEE/ACM Transactions on Networking.

[51]  Biswanath Mukherjee,et al.  Analysis of an algorithm for distributed recognition and accountability , 1993, CCS '93.

[52]  Andreas Haeberlen,et al.  Pretty Good Packet Authentication , 2008, HotDep.

[53]  Ralf Küsters,et al.  Accountability: definition and relationship to verifiability , 2010, CCS '10.

[54]  Giampaolo Bella,et al.  Inductive verification of cryptographic protocols , 2000 .

[55]  Andreas Haeberlen,et al.  The Case for Byzantine Fault Detection , 2006, HotDep.

[56]  Andreas Haeberlen,et al.  Accountable Virtual Machines , 2010, OSDI.

[57]  Andreas Haeberlen,et al.  PeerReview: practical accountability for distributed systems , 2007, SOSP.

[58]  Thomas J. Hacker,et al.  Accounting and Accountability for Distributed and Grid Systems , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).

[59]  Jie Wu,et al.  A Quantitative Study of Accountability in Wireless Multi-hop Networks , 2010, 2010 39th International Conference on Parallel Processing.

[60]  Ting Yu,et al.  SecureMR: A Service Integrity Assurance Framework for MapReduce , 2009, 2009 Annual Computer Security Applications Conference.

[61]  Hua Wang,et al.  Security and privacy in RFID systems: [special issue of International Journal of Security and Networks] , 2010 .

[62]  Victor C. M. Leung,et al.  Improved IP Multimedia Subsystem Authentication mechanism for 3G-WLAN networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[63]  Guoliang Xue,et al.  Authenticating strangers in Online Social Networks , 2011, Int. J. Secur. Networks.

[64]  Jeffrey S. Chase,et al.  The role of accountability in dependable distributed systems , 2005 .

[65]  Yang Xiao Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.

[66]  Yang Xiao,et al.  Building Accountable Smart Grids in Neighborhood Area Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[67]  Yang Xiao,et al.  EagleEye: A logging framework for accountable distributed and networked systems , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[68]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[69]  Joan Feigenbaum,et al.  Towards a formal model of accountability , 2011, NSPW '11.

[70]  Steven M. Bellovin,et al.  Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.

[71]  Andreas Haeberlen,et al.  CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable , 2009, NDSS.

[72]  Anne-Marie Kermarrec,et al.  LiFTinG: Lightweight Freerider-Tracking in Gossip , 2010, Middleware.

[73]  Shensheng Tang,et al.  An epidemic model with adaptive virus spread control for Wireless Sensor Networks , 2011, Int. J. Secur. Networks.

[74]  Yang Xiao,et al.  PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks , 2010, ISA.

[75]  Zhi-Li Zhang,et al.  LIPS: A lightweight permit system for packet source origin accountability , 2006, Comput. Networks.

[76]  Andreas Haeberlen,et al.  A case for the accountable cloud , 2010, OPSR.