Cobalt: Separating Content Distribution from Authorization in Distributed File Systems
نویسندگان
چکیده
How should a distributed file system manage access to protected content? On one hand, distributed storage should make data access pervasive: authorized users should be able to access their data from any location. On the other hand, content protection is designed to restrict access— this is often accomplished by limiting the set of computers from which content can be accessed. In this paper, we propose a new method for storing content in distributed storage called Cobalt. Rather than grant access to data based on the computer that reads the data, Cobalt grants access based on the physical proximity of authorized users. Protected content is stored encrypted in the distributed Blue File System; files can only be decrypted through the cooperation of a personal, mobile device such as cell phone. The Cobalt device is verified by content providers: it acts as a proxy that protects their interests by only decrypting data when policies specified during content acquisition are satisfied. Wireless communication with the device is used to determine the physical proximity of its user; when the Cobalt device moves out of range, protected content is made inaccessible. Our results show that Cobalt adds only modest overhead to content acquisition and playback, yet it enables new forms of interaction such as the ability to access protected content on ad hoc media players and create playlists that adapt to the tastes of nearby users.
منابع مشابه
Access control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملDistributed Systems Security
A distributed system is a set of autonomous units connected through some network. The most used distribution architectures are CORBA, DCOM, and RMI. CORBA is an architectural standard for interoperability of systems using different operating systems and languages. DCOM is Microsoft's distribution architecture for COM components. It only allows interoperation of Microsoft's systems. RMI (Remote ...
متن کاملStudy on Security and Quality of Service Implementations in P2p Overlay Network for Efficient Content Distribution
Peer-to-peer (P2P) is a distributed system without any centralized control or hierarchical organization nodes organize itself in a dynamic way. It allows different applications to achieve efficient and simple file sharing. Without any authentication adversary nodes can spoof the identity and spoil the integrity by falsifying the messages in the overlay. This enables malicious nodes to launch ma...
متن کاملCapability File Names: Separating Authorisation From User Management in an Internet File System
The ability to access and share information over the Internet has introduced the need for new flexible, dynamic and fine-grained access control mechanisms. None of the current mechanisms for sharing information – distributed file systems and the web – offer adequate support for sharing in a large and highly dynamic group of users. Distributed file systems lack the ability to share information w...
متن کاملIntrusion Tolerance in Distributed Computing Systems
An intrusion-tolerant distributed system is a system which is designed so that any intrusion into a part of the system will not endanger confidentiality, integrity and availability. This approach is suitable for distributed systems, because distribution enables isolation of elements so that an intrusion gives physical access to only a part of the system. By intrusion, we mean not only computer ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007