Authenticating Operation-based History in Collaborative Systems

Hien Thi Thu Truong 1 Claudia-Lavinia Ignat 1 Pascal Molli 2
1 SCORE - Services and Cooperation
Inria Nancy - Grand Est, LORIA - NSS - Department of Networks, Systems and Services
Abstract : Within last years multi-synchronous collaborative editing systems became widely used. Multi-synchronous collaboration maintains multiple, simultaneous streams of activity which continually diverge and synchronized. These streams of activity are represented by means of logs of operations, i.e. user modifications. A malicious user might tamper his log of operations. At the moment of synchronization with other streams, the tampered log might generate wrong results. In this paper, we propose a solution relying on hash-chain based authenticators for authenticating logs that ensure the authenticity, the integrity of logs, and the user accountability. We present algorithms to construct authenticators and verify logs. We prove their correctness and provide theoretical and practical evaluations.
Complete list of metadatas

Cited literature [41 references]  Display  Hide  Download

https://hal.inria.fr/hal-00761045
Contributor : Hien Thi Thu Truong <>
Submitted on : Tuesday, December 4, 2012 - 5:58:16 PM
Last modification on : Tuesday, December 18, 2018 - 4:26:01 PM
Long-term archiving on : Saturday, December 17, 2016 - 7:50:47 PM

File

group155-truong.pdf
Files produced by the author(s)

Identifiers

Citation

Hien Thi Thu Truong, Claudia-Lavinia Ignat, Pascal Molli. Authenticating Operation-based History in Collaborative Systems. ACM 2012 International Conference on Support Group Work, Oct 2012, Sanibel Island, FL, United States. pp.131-140, ⟨10.1145/2389176.2389197⟩. ⟨hal-00761045⟩

Share

Metrics

Record views

1982

Files downloads

536