5 RELATED WORK
Many researches have been accumulated on security
in multicast groups. Gothic (Judge, 2002) provides
security service for IP-Multicast. An external access
control server performs authentication and authori-
zation based on PKI certificates. The Antigone
(McDaniel, 1999) utilizes a centralized access con-
trol approach in which member access is mediated
by a Session Leader.
Sconce(Kim, 2003) presents an admission control
framework in peer groups, which treats peer groups
as a flat structure where all peer nodes have identical
rights and responsibilities. Thus Sconce, which lacks
the attribute of peers, can not simplify authorization
in collaborative environments. JXTA presents a se-
curity mechanism also based on PKI certificates
(Altman, 2003). Intergroup (Agarwal, 2001) pro-
vides access control by using an authorization ser-
vice, Akenti (Thompson, 2003), which provides a
coarse granularity for access control.
Most of the systems described above provide ac-
cess control based on identify of participants, in-
stead, this paper adopts attribute-based access con-
trol in group. Based on the RT languages (Li, 2002),
our work presents a fine-grained access control
framework for collaborative peer groups. Mean-
while, based on the policy model, this paper empha-
sizes the need of joint management for peer groups.
Joint authorization efficiently provides security for
communication and data resources shared by multi-
ple peers.
6 CONCLUSION
This paper presents a fine-grained and attribute-
based access control framework for collaborative
peer groups. We propose a distributed delegation
authorization mechanism to avoid single point of
failure. In order to simplify authorization and access
control in collaborations, access control decisions
are made based on authenticated attributes of the
peers, which improve flexibility of decentralized au-
thorization. By applying JXTA technology, this pa-
per describes a formal joint authorization protocol
under voting schemes, to satisfy security require-
ments of multiple peers.
REFERENCES
Sunderam, V., Pascoe, J., Loader, R., 2003. Towards a
Framework for Collaborative Peer Groups. In the 3rd
IEEE/ACM International Symposium on Cluster Com-
puting and the Grid.
Gong, L., 2002. Project JXTA: A Technology Overview.
from http://www.jxta.org/project/www/docs/
TechOverview.pdf.
Rodeh, O., Birman, K., Dolev, D., 2000. Using AVL
Trees for Fault Tolerant Group Key Management.
Technical Report 2000-1823, Cornell University,
Computer Science.
Judge, P., Ammar, M., 2002. Gothic: A Group Access
Control Architecture for Secure Multicast and Any-
cast. In INFOCOM.
Agarwal, D., Chevassut, O., Thompson, M., Tsudik, G.,
2001. An Integrated Solution for Secure Group Com-
munication in Wide-Area Networks. In the 6th IEEE
Symposium on Computers and Communications.
Li, N., Mitchell, J., Winsborough, W., 2002. Design of a
Role-Based Trust Management Framework. In the
IEEE Symposium on Security and Privacy.
Kamvar, S., Schlosser, M., 2003. EigenRep: Reputation
Management in P2P Networks. In the Twelfth Interna-
tional World Wide Web Conference.
L, H., Yoon, K., 1981. Multiple Criteria Decision Making.
Lecture Notes in Economics and Mathematical Sys-
tems.
Sun Microsystems Project JXTA v2.0: Java Programmer's
Guide. 2002, from http://www.jxta.org/.
Altman, J., 2003. Sun Microsystems, Project JXTA: PKI
Security for JXTA Overly Networks. from
http://www.jxta.org/docs/pki-security-for-jxta.pdf.
McDaniel, P., Prakash, A., Honeyman, P., 1999. Anti-
gone: A Flexible Framework for Secure Group Com-
munication. In the 8th USENIX Security Symposium.
Kim, Y., Mazzocchi, D., Tsudik, G., 2003. Admission
Control in Peer Groups. In the IEEE International
Symposium on Network Computing and Applications.
Thompson, M., Essiari, A., Mudumbai, S., 2003. Certifi-
cate-Based Authorization Policy in a PKI Environ-
ment. ACM Transactions on Information and System
Security.
Nita-Rotaru, C., Li, N., 2004. A Framework for Role-
Based Access Control in Group Communication Sys-
tems. In the International Workshop on Security in
Parallel and Distributed Systems.
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
86