Security Rationale for a Cooperative Backup Service for Mobile Devices

  • Ludovic Courtès
  • Marc-Olivier Killijian
  • David Powell
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4746)

Abstract

Mobile devices (e.g., laptops, PDAs, cell phones) are increasingly relied on but are used in contexts that put them at risk of physical damage, loss or theft. This paper discusses security considerations that arise in the design of a cooperative backup service for mobile devices. Participating devices leverage encounters with other devices to temporarily replicate critical data. Anyone is free to participate in the cooperative service, without requiring any prior trust relationship with other participants. In this paper, we identify security threats relevant in this context as well as possible solutions and discuss how they map to low-level security requirements related to identity and trust establishment. We propose self-organized, policy-neutral mechanisms that allow the secure designation and identification of participating devices. We show that they can serve as a building block for a wide range of cooperation policies that address most of the security threats we are concerned with. We conclude on future directions.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aiyer, A.S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.-P., Porth, C.: BAR Fault Tolerance for Cooperative Services. In: Proceedings of the ACM Symposium on Operating Systems Principles, pp. 45–58. ACM Press, New York (2005)CrossRefGoogle Scholar
  2. 2.
    Bennett, K., Grothoff, C., Horozov, T., Patrascu, I.: Efficient Sharing of Encrypted Data. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 107–120. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  3. 3.
    Boulkenafed, M., Issarny, V.: AdHocFS: Sharing Files in WLANs. In: Proceedings of the 2nd International Symposium on Network Computing and Applications (April 2003)Google Scholar
  4. 4.
    Buchegger, S., Le Boudec, J.-Y.: The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks. In: Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (March 2003)Google Scholar
  5. 5.
    Buttyán, L., Hubaux, J.-P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM/Kluwer Mobile Networks and Applications 8(5), 579–592 (2003)CrossRefGoogle Scholar
  6. 6.
    Buttyán, L., Hubaux, J.-P.: Enforcing Service Availability in Mobile Ad-Hoc WANs. In: Proceedings of the First ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 87–96. IEEE CS Press, Los Alamitos (2000)Google Scholar
  7. 7.
    Callas, J., Donnerhacke, L., Finney, H., Thayer, R.: OpenPGP Message Format (RFC 2440). Internet Engineering Task Force (IETF) (November 1998), http://tools.ietf.org/html/rfc2440
  8. 8.
    Capkun, S., Buttyán, L., Hubaux, J.-P.: Small Worlds in Security Systems an Analysis of the PGP Certificate Graph. In: Proceedings of the Workshop on New Security Paradigms, pp. 28–35. ACM Press, New York (2002)Google Scholar
  9. 9.
    Capkun, S., Buttyán, L., Hubaux, J.-P.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)CrossRefGoogle Scholar
  10. 10.
    Chiu, A.: Authentication Mechanisms for ONC RPC (RFC 2695). Internet Engineering Task Force (IETF) (September 1999), http://tools.ietf.org/html/rfc2695
  11. 11.
    Courtès, L., Hamouda, O., Kaâniche, M., Killijian, M.-O., Powell, D.: Assessment of Cooperative Backup Strategies for Mobile Devices. Technical Report 06817, LAAS-CNRS (December 2006)Google Scholar
  12. 12.
    Courtès, L., Killijian, M.-O., Powell, D.: Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices. In: Proceedings of the Sixth European Dependable Computing Conference, pp. 129–138. IEEE CS Press, Los Alamitos (2006)CrossRefGoogle Scholar
  13. 13.
    Cox, L.P., Murray, C.D., Noble, B.D.: Pastiche: Making Backup Cheap and Easy. In: Fifth USENIX Symposium on Operating Systems Design and Implementation, pp. 285–298 (December 2002)Google Scholar
  14. 14.
    Cox, L.P., Noble, B.D.: Samsara: Honor Among Thieves in Peer-to-Peer Storage. In: Proceedings 19th ACM Symposium on Operating Systems Principles, pp. 120–132. ACM Press, New York (2003)Google Scholar
  15. 15.
    Dierks, T., Rescorla, E., Teerse, W.: The Transport Layer Security (TLS) Protocol, Version 1.1 (RFC 4346). Internet Engineering Task Force (IETF) (2006), http://tools.ietf.org/html/rfc4346
  16. 16.
    Douceur, J.R.: The Sybil Attack. In: Revised Papers from the First International Workshop on Peer-to-Peer Systems (IPTPS), pp. 251–260. Springer, Heidelberg (2002), http://www.cs.rice.edu/Conferences/IPTPS02/ Google Scholar
  17. 17.
    Eisler, M., Chiu, A., Ling, L.: RPCSEC_GSS Protocol Specification (RFC 2203). Internet Engineering Task Force (IETF) (September 1997), http://tools.ietf.org/html/rfc2203
  18. 18.
    Ellison, C.M., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory (RFC 2693). Internet Engineering Task Force (IETF) (September 1999), http://www.ietf.org/rfc/rfc2693.txt
  19. 19.
    Ellison, C.M.: Establishing Identity Without Certification Authorities. In: Proceedings of the Sixth USENIX Security Symposium, pp. 67–76 (1996)Google Scholar
  20. 20.
    Fall, K.: A Delay-Tolerant Network Architecture for Challenged Internets. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pp. 27–34 (August 2003)Google Scholar
  21. 21.
    Farrell, S., Cahill, V.: Security Considerations in Space and Delay Tolerant Networks. In: Proceedings of the 2nd IEEE International Conference on Space Mission Challenges for Information Technology, pp. 29–38. IEEE CS Press, Los Alamitos (2006)CrossRefGoogle Scholar
  22. 22.
    Flinn, J., Sinnamohideen, S., Tolia, N., Satyanarayanan, M.: Data Staging on Untrusted Surrogates. In: Proceedings of the USENIX Conference on File and Storage Technologies (FAST) (March 2003)Google Scholar
  23. 23.
    Grothoff, C.: An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks. Wirtschaftsinformatik 45(3), 285–292 (2003)Google Scholar
  24. 24.
    Harras, K.A., Wittie, M.P., Almeroth, K.C., Belding, E.M.: ParaNets: A Parallel Network Architecture for Challenged Networks. In: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, IEEE Computer Society Press, Los Alamitos (2007)Google Scholar
  25. 25.
    Josefsson, S., Mavrogiannopoulos, N.: The GNU TLS Library (2006), http://gnutls.org/
  26. 26.
    Karypidis, A., Lalis, S.: OmniStore: A System for Ubiquitous Personal Storage Management. In: Proceedings of the Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 136–147. IEEE CS Press, Los Alamitos (2006)CrossRefGoogle Scholar
  27. 27.
    Killijian, M.-O., Powell, D., Banâtre, M., Couderc, P., Roudier, Y.: Collaborative Backup for Dependable Mobile Applications. In: Middleware 2004. Proceedings of 2nd International Workshop on Middleware for Pervasive and Ad-Hoc Computing, pp. 146–149. ACM Press, New York (2004)Google Scholar
  28. 28.
    Lai, K., Feldman, M., Chuang, J., Stoica, I.: Incentives for Cooperation in Peer-to-Peer Networks. In: Proceedings of the Workshop on Economics of Peer-to-Peer Systems (2003)Google Scholar
  29. 29.
    Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., Isard, M.: A Cooperative Internet Backup Scheme. In: Proceedings of the USENIX Annual Technical Conference, pp. 29–42 (June 2003)Google Scholar
  30. 30.
    Marti, S., Garcia-Molina, H.: Identity Crisis: Anonymity vs. Reputation in P2P Systems. In: IEEE Conference on Peer-to-Peer Computing, pp. 134–141. IEEE CS Press, Los Alamitos (September 2003)Google Scholar
  31. 31.
    Mavrogiannopoulos, N.: Using OpenPGP Keys for TLS Authentication (IETF Internet Draft). In: Internet Engineering Task Force (IETF) (July 2006), http://www.ietf.org/internet-drafts/draft-ietf-tls-openpgp-keys-11.txt
  32. 32.
    Merkle, R.C.: Protocols for Public Key Cryptosystems. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 122–134. IEEE Computer Society Press, Los Alamitos (1980)Google Scholar
  33. 33.
    Michiardi, P., Molva, R.: CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In: Proceedings of the Sixth IFIP TC6/TC11 Joint Conference on Communications and Multimedia Security, pp. 107–121. Kluwer Academic Publishers, Dordrecht (2002)Google Scholar
  34. 34.
    Milgram, S.: The Small World Problem. Psychology Today 2, 60–67 (1967)Google Scholar
  35. 35.
    Miller, M.S.: Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control, PhD Thesis, Johns Hopkins University, Baltimore, MA, USA (May 2006)Google Scholar
  36. 36.
    Montenegro, G., Castelluccia, C.: Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2002)Google Scholar
  37. 37.
    Quinlan, S., Dorward, S.: Venti: A New Approach to Archival Storage. In: Proceedings of the First USENIX Conference on File and Storage Technologies, pp. 89–101 (2002)Google Scholar
  38. 38.
    Mizanur Rahman, S.M., Inomata, A., Okamoto, T., Mambo, M., Okamoto, E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. In: Proceedings of the First International Conference on Ubiquitous Convergence Technology, pp. 131–140. Springer, Heidelberg (2006)Google Scholar
  39. 39.
    Sailhan, F., Issarny, V.: Scalable Service Discovery for MANET. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communication, IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  40. 40.
    Srinivasan, R.: RPC: Remote Procedure Call Protocol Specification, Version 2 (RFC 1831). In: Internet Engineering Task Force (IETF) (August 1995), http://tools.ietf.org/html/rfc1831
  41. 41.
    Yin, L., Cao, G.: Supporting Cooperative Caching in Ad Hoc Networks. IEEE Transactions on Mobile Computing 5(1), 77–89 (2006)CrossRefGoogle Scholar
  42. 42.
    Zhang, Z.: Routing in Intermittently Connected Mobile Ad Hoc Networks and Delay Tolerant Networks: Overview and Challenges. IEEE Communications Surveys & Tutorials 8, 24–37 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Ludovic Courtès
    • 1
  • Marc-Olivier Killijian
    • 1
  • David Powell
    • 1
  1. 1.LAAS-CNRS, Université de ToulouseFrance

Personalised recommendations