In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems

  • Authors:
  • Fengjun Li;Bo Luo;Peng Liu;Dongwon Lee;Prasenjit Mitra;Wang-Chien Lee;Chao-Hsien Chu

  • Affiliations:
  • Pennsylvania State University, University Park, PA 16802, USA;Pennsylvania State University, University Park, PA 16802, USA;Pennsylvania State University, University Park, PA 16802, USA;Pennsylvania State University, University Park, PA 16802, USA;Pennsylvania State University, University Park, PA 16802, USA;Pennsylvania State University, University Park, PA 16802, USA;Pennsylvania State University, University Park, PA 16802, USA

  • Venue:
  • SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

An XML brokerage system is a distributed XML database system that comprises data sources and brokers which, respectively, hold XML documents and document distribution information. However, all existing information brokerage systems view or handle query brokering and access control as two orthogonal issues: query brokering is a system issue that concerns costs and performance, while access control is a security issue that concerns information confidentiality. As a result, access control deployment strategies (in terms of where and when to do access control) and the impact of such strategies on end-to-end system performance are neglected by existing information brokerage systems. In addition, data source side access control deployment is takenfor- granted as the "right" thing to do. In this paper, we challenge this traditional, taken-for-granted access control deployment methodology, and argue that query brokering and access control are not two orthogonal issues because access control deployment strategies can have a significant impact on the "whole" system's end-to-end performance. We propose the first in-broker access control deployment strategy where access control is "pushed" from the boundary into the "heart" of the information brokerage system.