TUM Logo

A survey on authorization in distributed systems: Information storage, data retrieval and trust evaluation

In distributed environments, entities are distributed among different security domains and they do not have prior knowledge of one another. In this setting, distributed systems and their security components such as entities, certificates, credentials, policies and trust values are dynamic and constantly changing. Thus, access control models and trust approaches are necessary to support the dynamic and distributed features of such systems and their components. The objective of this paper is to present a comprehensive survey about the security research in distributed systems. We have reviewed the dynamic and distributed nature of the components and evaluation methods of major authorization systems and access control models in existing literature. Based on this overview, we present a survey of selected trust schemes. We provide a categorization for recommendation-based and reputation-based trust models based on trust evaluation. Additionally, we use credential or certifica te storage and chain discovery methods for categorizing evidencebased and policy-based trust models. This work can be used as a reference guide to understand authorization and trust management and to further research fully decentralized and distributed authorization systems.

A survey on authorization in distributed systems: Information storage, data retrieval and trust evaluation

16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications,

Authors: Ava Ahadipour and Martin Schanzenbach
Year/month: 2017/8
Booktitle: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications,
Pages: 1016-1023
Oranization: IEEE
Fulltext: click here

Abstract

In distributed environments, entities are distributed among different security domains and they do not have prior knowledge of one another. In this setting, distributed systems and their security components such as entities, certificates, credentials, policies and trust values are dynamic and constantly changing. Thus, access control models and trust approaches are necessary to support the dynamic and distributed features of such systems and their components. The objective of this paper is to present a comprehensive survey about the security research in distributed systems. We have reviewed the dynamic and distributed nature of the components and evaluation methods of major authorization systems and access control models in existing literature. Based on this overview, we present a survey of selected trust schemes. We provide a categorization for recommendation-based and reputation-based trust models based on trust evaluation. Additionally, we use credential or certifica te storage and chain discovery methods for categorizing evidencebased and policy-based trust models. This work can be used as a reference guide to understand authorization and trust management and to further research fully decentralized and distributed authorization systems.

Bibtex:

@inproceedings { ahadipo2017,
author = { Ava Ahadipour and Martin Schanzenbach},
title = { A survey on authorization in distributed systems: Information storage, data retrieval and trust evaluation },
year = { 2017 },
month = { August },
booktitle = { 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, },
pages = { 1016-1023 },
organization = { IEEE },
url = { http://dx.doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.346 },

}