{"title":"R2D2:正确的位置,正确的路径数据传递","authors":"Ehab Ashary, C. E. Chow, Ashish Korpe, D. Thorpe","doi":"10.1109/DESEC.2017.8073816","DOIUrl":null,"url":null,"abstract":"Data security can be enhanced by not only strong encryption techniques but also by restricting who can receive the data, as well as where and how they are received. In this paper, we focus on how to specify and verify where and how the data are received. The challenging issue here is how to utilize trustworthy 3rd party verification mechanisms to check whether a requester is in the designated area specified by the creator and whether the delivery follows a desired path. We call this new service Right Place, Right Path Data Delivery (R2D2). The current network and geolocation techniques are investigated for their capabilities in verifying and ensuring such R2D2 services. We created software tools to specify and verify such R2D2 services. We show that the verification of R2D2 services is quite challenging.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"46 1","pages":"273-279"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"R2D2: Right place, right path data delivery\",\"authors\":\"Ehab Ashary, C. E. Chow, Ashish Korpe, D. Thorpe\",\"doi\":\"10.1109/DESEC.2017.8073816\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data security can be enhanced by not only strong encryption techniques but also by restricting who can receive the data, as well as where and how they are received. In this paper, we focus on how to specify and verify where and how the data are received. The challenging issue here is how to utilize trustworthy 3rd party verification mechanisms to check whether a requester is in the designated area specified by the creator and whether the delivery follows a desired path. We call this new service Right Place, Right Path Data Delivery (R2D2). The current network and geolocation techniques are investigated for their capabilities in verifying and ensuring such R2D2 services. We created software tools to specify and verify such R2D2 services. We show that the verification of R2D2 services is quite challenging.\",\"PeriodicalId\":92346,\"journal\":{\"name\":\"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...\",\"volume\":\"46 1\",\"pages\":\"273-279\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DESEC.2017.8073816\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DESEC.2017.8073816","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data security can be enhanced by not only strong encryption techniques but also by restricting who can receive the data, as well as where and how they are received. In this paper, we focus on how to specify and verify where and how the data are received. The challenging issue here is how to utilize trustworthy 3rd party verification mechanisms to check whether a requester is in the designated area specified by the creator and whether the delivery follows a desired path. We call this new service Right Place, Right Path Data Delivery (R2D2). The current network and geolocation techniques are investigated for their capabilities in verifying and ensuring such R2D2 services. We created software tools to specify and verify such R2D2 services. We show that the verification of R2D2 services is quite challenging.