P-Accountability: A Quantitative Study of Accountability in Networked Systems

Accountability in computing implies that an entity should be held responsible for its behaviors with verifiable evidence. In order to study accountability, quantitative methods would be very helpful. Even though there are some researches in accountability, there are no other works which study quantitative accountability in practical settings, while quantitative accountability is defined as using quantities or metrics to measure accountability. In this paper, we propose P-Accountability, which is a quantitative approach to assess the degree of accountability for practical systems. P-Accountability is defined with two versions, a flat model and a hierarchical one, which can be chosen to use depending on how complex the system is. We then provide a complete case study that applies P-Accountability to PeerReview, which provides Byzantine fault detection for distributed systems. In addition, we propose Traceable PeerReview, which is our effort to apply PeerReview to wireless multi-hop environments. In addition, through the system evaluation we can show that the simulation outcomes are aligned with the numeric results.

[1]  Yang Xiao,et al.  Accountable administration in operating systems , 2017, Int. J. Inf. Comput. Secur..

[2]  Lawrence C. Paulson,et al.  Accountability protocols: Formalized and verified , 2006, TSEC.

[3]  Yang Xiao,et al.  PeerReview re-evaluation for accountability in distributed systems or networks , 2012, Int. J. Secur. Networks.

[4]  Nick Feamster,et al.  Holding the Internet Accountable , 2007, HotNets.

[5]  Xingming Sun,et al.  Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.

[6]  Jeffrey S. Chase,et al.  Trust but verify: accountability for network services , 2004, EW 11.

[7]  Jennifer Rexford,et al.  Accountability in hosted virtual networks , 2009, VISA '09.

[8]  Nick Feamster,et al.  Accountable internet protocol (aip) , 2008, SIGCOMM '08.

[9]  Robin Milner,et al.  Communicating and mobile systems - the Pi-calculus , 1999 .

[10]  Jing Liu,et al.  Temporal Accountability and Anonymity in Medical Sensor Networks , 2011, Mob. Networks Appl..

[11]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Jin Wang,et al.  Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .

[13]  P. Reiher,et al.  Building accountability into the future Internet , 2008, 2008 4th Workshop on Secure Network Protocols.

[14]  Noureddine Boudriga,et al.  Visibility: a novel concept for characterising provable network digital evidences , 2009, Int. J. Secur. Networks.

[15]  Jeffrey S. Chase,et al.  Strong accountability for network storage , 2007, TOS.

[16]  Joan Feigenbaum,et al.  Towards a formal model of accountability , 2011, NSPW '11.

[17]  Jing Liu,et al.  Achieving Accountability in Smart Grid , 2014, IEEE Systems Journal.

[18]  Indrajit Ray,et al.  Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents , 2008, Int. J. Secur. Networks.

[19]  John M. Boone,et al.  INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .

[20]  Yang Xiao,et al.  An Accountable Framework for Sensing-Oriented Mobile Cloud Computing , 2014 .

[21]  Yang Xiao,et al.  Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems , 2006, IEEE Journal on Selected Areas in Communications.

[22]  Andreas Haeberlen,et al.  CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable , 2009, NDSS.

[23]  Andreas Haeberlen,et al.  PeerReview: practical accountability for distributed systems , 2007, SOSP.

[24]  Yang Xiao,et al.  Accountable Administration and Implementation in Operating Systems , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[25]  Bo Fu,et al.  A multi-resolution flow-net methodology for accountable logging and its application in TCP/IP networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[26]  Toby Moncaster,et al.  Re-ECN: Adding Accountability for Causing Congestion to TCP/IP , 2010 .

[27]  Daisuke Takahashi,et al.  Accountability using flow-net: design, implementation, and performance evaluation , 2012, Secur. Commun. Networks.

[28]  Daisuke Takahashi,et al.  Virtual flow-net for accountability and forensics of computer and network systems , 2014, Secur. Commun. Networks.

[29]  Vern Paxson,et al.  End-to-end Internet packet dynamics , 1997, SIGCOMM '97.

[30]  Yang Xiao,et al.  Throughput and delay limits of IEEE 802.11 , 2002, IEEE Communications Letters.

[31]  Yang Xiao,et al.  Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols , 2003, MOCO.

[32]  Jing Liu,et al.  An Accountable Neighborhood Area Network in Smart Grids , 2012 .

[33]  Jeffrey S. Chase,et al.  The role of accountability in dependable distributed systems , 2005 .

[34]  Svein J. Knapskog,et al.  A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[35]  Yang Xiao Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.

[36]  Yang Xiao Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.

[37]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[38]  Zan Li,et al.  The portable distributed fusion algorithm between loss and lossless systems , 2014, Int. J. Sens. Networks.

[39]  Bo Fu,et al.  Accountability and Q-Accountable Logging in Wireless Networks , 2014, Wireless Personal Communications.

[40]  Rastko R. Selmic,et al.  Topological and combinatorial coverage hole detection in coordinate-free wireless sensor networks , 2016, Int. J. Sens. Networks.

[41]  Radha Jagadeesan,et al.  Towards a Theory of Accountability and Audit , 2009, ESORICS.

[42]  Ruth Breu,et al.  Quantitative Assessment of Enterprise Security System , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[43]  Jie Wu,et al.  A Quantitative Study of Accountability in Wireless Multi-hop Networks , 2010, 2010 39th International Conference on Parallel Processing.

[44]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[45]  Ralf Küsters,et al.  Accountability: definition and relationship to verifiability , 2010, CCS '10.

[46]  Giampaolo Bella,et al.  Inductive verification of cryptographic protocols , 2000 .

[47]  Bharat B. Madan,et al.  A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.

[48]  Katerina J. Argyraki,et al.  Loss and Delay Accountability for the Internet , 2007, 2007 IEEE International Conference on Network Protocols.

[49]  Bo Fu,et al.  A multi-resolution accountable logging and its applications , 2015, Comput. Networks.

[50]  Sudhir Aggarwal,et al.  Incorporating accountability into internet email , 2009, SAC '09.

[51]  Romano Fantacci,et al.  Efficient scheduling techniques for high data-rate wireless personal area networks , 2007, Int. J. Sens. Networks.

[52]  Wei Song,et al.  Self-healing hierarchical architecture for ZigBee network in smart grid application , 2015, Int. J. Sens. Networks.