International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy

Download
218 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_39,
        author={Jinqiao Shi and Xiao Wang and Binxing Fang and Qingfeng Tan and Li Guo},
        title={Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Service accessibility Resource Trust management Resource distribution Sybil attack},
        doi={10.1007/978-3-319-23829-6_39}
    }
    
  • Jinqiao Shi
    Xiao Wang
    Binxing Fang
    Qingfeng Tan
    Li Guo
    Year: 2015
    Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_39
Jinqiao Shi,*, Xiao Wang,*, Binxing Fang,*, Qingfeng Tan,*, Li Guo,*
    *Contact email: shijinqiao@iie.ac.in, wangxiao@nelmail.iie.ac.in, fangbinxing@iie.ac.in, tanqingfeng@iie.ac.in, guoli@iie.ac.in

    Abstract

    Along with the rapid development of Internet, accessibility has become one of the most basic and important requirements for Internet service. Service resource, the knowledge that can help users get access to the service finally, is the focus of accessibility confrontation between the adversary and Internet services. Most of current resource distribution strategies adopt the “many access points” design and limit the number of service resources distributed to any user. However, current design is vulnerable to enumeration attack where an adversary can enumerate many service resources under the disguise of many pseudonyms (Sybil identities). To mitigate this challenge, an adaptive resource distribution strategy based on trust management is proposed in this paper. Under this strategy, user’s trust is adjusted according to his behavior. Both client puzzle and the resources assigned to the user are dynamically generated according to his trust value. Simulation result indicates that, this strategy can distinguish honest users from adversary Sybils, thus increasing the difficulty for an attacker to enumerate service resources while ensuring access to service for honest users.