Anitya: An Ephemeral Data Management Service and Secure Data Access Protocols for Dynamic Collaborations

Dynamic collaborations are the means by which a group of autonomous entities (possibly competing) collaborate to achieve a common objective by sharing resources that may be owned and managed both privately or jointly. Our focus in this paper is on controlling jointly owned shared data that is inherently ephemeral, as it does not exist outside the period of the collaboration. This paper explores the application of the ephemerizer concept as a means to control the access to shared collaboration data. Towards this, we first define a service-oriented architecture Anitya that enables the development of a third party service for managing ephemeral data in dynamic collaborations. We then extend the pair wise secure communication protocol used in the ephemerizer and propose three different multiparty secure group communication protocols for sharing collaboration data under the defined architecture. We also discuss the design, implementation, and evaluation of the architecture and protocols.

[1]  Wei Sun,et al.  CPU Load Predictions on the Computational Grid , 2006, CCGRID.

[2]  M. Condell,et al.  Multidimensional security policy management for dynamic coalitions , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[3]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[4]  Radia Perlman,et al.  The ephemerizer: making data disappear , 2005 .

[5]  John Zic,et al.  Enterprise Collaborative Contexts and their Provisioning for Secure Managed Extranets , 2006, 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'06).

[6]  Antony I. T. Rowstron,et al.  PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[7]  Juan Chen,et al.  Improving a Local Learning Technique for QueueWait Time Predictions , 2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06).

[8]  Himanshu Khurana,et al.  A model for access negotiations in dynamic coalitions , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[9]  Peter A. Dinda Online Prediction of the Running Time of Tasks , 2004, Cluster Computing.

[10]  Warren Smith,et al.  Improving resource selection and scheduling using predictions , 2004 .

[11]  T. C. Ting,et al.  Information sharing and security in dynamic coalitions , 2002, SACMAT '02.

[12]  Vijay Karamcheti,et al.  dRBAC: distributed role-based access control for dynamic coalition environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[13]  Ravi S. Sandhu,et al.  Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.

[14]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[15]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.