浏览全部资源
扫码关注微信
1. 南京审计大学工学院,江苏 南京 211815
2. 南京审计大学江苏省公共工程审计重点实验室,江苏 南京 211815
3. 安徽大学计算机科学与技术学院,安徽 合肥 230601
[ "韩志耕(1976-),男,江苏东台人,博士,南京审计大学讲师,主要研究方向为网络安全与管理。" ]
[ "冯霞(1983-),女,江苏扬中人,安徽大学博士生,主要研究方向为数据安全。" ]
[ "陈耿(1965-),男,江苏无锡人,博士,南京审计大学教授、硕士生导师,主要研究方向为数据安全、网络取证。" ]
网络出版日期:2016-09,
纸质出版日期:2016-09-25
移动端阅览
韩志耕, 冯霞, 陈耿. 基于SDN的电邮抵赖源头抑制方法[J]. 通信学报, 2016,37(9):55-67.
Zhi-geng HAN, Xia FENG, Geng CHEN. SDN based e-mail repudiation source restraining method[J]. Journal on communications, 2016, 37(9): 55-67.
韩志耕, 冯霞, 陈耿. 基于SDN的电邮抵赖源头抑制方法[J]. 通信学报, 2016,37(9):55-67. DOI: 10.11959/j.issn.1000-436x.2016178.
Zhi-geng HAN, Xia FENG, Geng CHEN. SDN based e-mail repudiation source restraining method[J]. Journal on communications, 2016, 37(9): 55-67. DOI: 10.11959/j.issn.1000-436x.2016178.
受制于现有互联网体系可管控性的丧失,以签收电邮为代表的安全电邮技术仅能对电邮抵赖进行事后检测而无法实施源头抑制。基于SDN(software-defined networking)控制与数据相分离的思想,通过将定制的抵赖抑制单元旁路附加到传统电邮模型之上,提出一种不破坏现有电邮结构的电邮抵赖源头抑制方法。在给出抵赖抑制单元内嵌的电邮证据绑定协议、抵赖行为检测算法、签收信度评估模型和抑制策略形成算法后,对所提方法在4 种交叉场景中进行了有效性测试。实验结果表明,在与当前电邮系统兼容共生的前提下,所提方法能够对电邮抵赖实施有效的源头抑制。
With the limitation of controllability of the existing Internet architecture
the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data separation of software-defined networking technology
by means of bypass attaching customized repudiation restrain unit to the traditional e-mail model.An e-mail repudiation source restraining method was proposed without destroying the existing e-mail structure.After presenting e-mail evidence binding protocol
repudiation behavior detection algorithm
certified reputation evaluation model
and repudiation restraining strategy formation algorithm embedded in repudiation restrain unit
the effectiveness were tested of the proposed method in 4 cross scenarios.The experimental results show that
under the premise of compatibility with the current e-mail system
the method can source restrain e-mail repudiation effectively.
WELLS T M , DENNIS A R . To e-mail or not to e-mail:the impact of media on psychophysiological responses and emotional content in utilitarian and romantic communication [J ] . Computers in Human Behavior , 2016 , 54 : 1 - 9 .
TAUBER A . A survey of certified mail systems provided on the Internet [J ] . Computers & Security , 2011 , 30 : 464 - 485 .
FERRER-GOMILLA J L , ONIEVA J A , PAYERAS M , et al . Certified electronic mail:properties revisited [J ] . Computers & Security , 2010 , 29 ( 2 ): 167 - 179 .
KIM H , FEAMSTER N . Improving network management with software defined networking [J ] . IEEE Communications Magazine , 2013 , 51 ( 2 ): 114 - 119 .
ALI S T , SIVARAMAN V , RADFORD A , et al . A survey of securing networks using software defined networking [J ] . IEEE Transactions on Reliability , 2015 , 64 ( 3 ): 1086 - 1097 .
BECHTOLD S , PERRIG A . Accountability in future Internet architectures [J ] . Communications of the ACM , 2014 , 57 ( 9 ): 21 - 23 .
WANG Y , SUSILO W , AU MH , et al . Collusion-resistance in optimistic fair exchange [J ] . IEEE Transactions on Information Forensics and Security , 2014 , 9 ( 8 ): 1227 - 1239 .
ONIEVA J A , ZHOU J , LOPEZ J . Enhancing certified e-mail service for timeliness and multicast [C ] // 2004 International Network Conference . Plymouth,UK , 2004 : 327 - 336 .
MICALI S , . Simple and fast optimistic protocols for fair electronic exchange [C ] // The twenty-second annual symposium on Principles of distributed computing . Boston,USA , 2003 : 12 - 19 .
SHAO MH , WANG G , ZHOU J . Some common attacks against certified e-mail protocols and the countermeasures [J ] . Computer Communications , 2006 , 29 ( 15 ): 2759 - 2769 .
PAYERAS-CAPELLÀ M M , MUT-PUIGSERVER M , FERRER-GOMILA J L , et al . No author based selective receipt in an efficient certified e-mail protocol [C ] // 2009 17th Euromicro International Conference on Parallel,Distributed and Network-based Processing . Weimar , 2009 : 387 - 392 .
PUIGSERVER M M , GOMILA J L F , ROTGER L H . Certified electronic mail protocol resistant to a minority of malicious third parties [C ] // Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 2000) . 2000 : 1401 - 1405 .
ATENIESE G , MEDEIROS BD , GOODRICH MT . TRICERT:a distributed certified e-mail schemes [C ] // 2001 Network and Distributed System Security Symposium . San Diego,USA , 2001 .
ZHOU J , ONIEVA J , LOPEZ J . Optimized multi-party certified e-mail protocols [J ] . Information Management & Computer Security , 2005 , 13 ( 5 ): 350 - 366 .
WANG C , LAN C , NIU S , et al . An ID-based certified e-mail protocol with STTP suitable for wireless mobile environments [J ] . Journal of Computers , 2013 , 8 ( 1 ): 3 - 9 .
TAUBER A , APITZSCH J , BOLDRIN L . An interoperability standard for certified mail systems [J ] . Computer Standards & Interfaces , 2012 , 34 : 452 - 466 .
TAUBER A , KUSTOR P , KARNING B . Cross-border certified electronic mailing:a European perspective [J ] . Computer Law & Security Review , 2013 , 29 ( 1 ): 28 - 39 .
DRAPER-GIL G , FERRER-GOMILA JL , HINAREJOS MF , et al . An optimistic certified e-mail protocol for the current Internet e-mail architecture [C ] // 2014 IEEE Conference on Communications and Network Security(CNS) . San Francisco , 2014 : 382 - 390 .
PAULIN A , WELZER T . A universal system for fair non-repudiable certified e-mail without a trusted third party [J ] . Computers & Security , 2013 , 32 : 207 - 218 .
LARA A , KOLASANI A , Ramamurthy B . Network innovation using OpenFlow:a survey [J ] . IEEE Communications Surveys & Tutorials , 2014 , 16 ( 1 ): 493 - 512 .
KREUTZ D , RAMOS F M V , VERISSIMO P E , et al . Softwaredefined networking:A comprehensive survey [J ] . Proceedings of the IEEE , 2015 , 103 ( 1 ): 14 - 76 .
SYVERSON P , VANOORSCHOT P C . A unified cryptographic protocol logic [R ] . Technical Report,NRL Publication 5540-227,Naval Research Lab , 1996 .
HENDRIKX F , BUBENDORFER K , CHARD R . Reputation systems:A survey and taxonomy [J ] . Journal of Parallel and Distributed Computing , 2015 , 75 : 184 - 197 .
SRIVATSA M , XIONG L , LIU L . TrustGuard:countering vulnerabilities in reputation management for decentralized overlay networks [C ] // The 14th international conference on World Wide Web (WWW2005) . Chiba,Japan , 2005 .
0
浏览量
835
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构