Authenticating Operation-Based History in Collaborative Systems
Fulltext URI
Document type
Additional Information
Date
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Within last years multi-synchronous collaborative editing systems became widely used. Multi-synchronous collaboration maintains multiple, simultaneous streams of activity which continually diverge and synchronized. These streams of activity are represented by means of logs of operations, i.e. user modifications. A malicious user might tamper his log of operations. At the moment of synchronization with other streams, the tampered log might generate wrong results. In this paper, we propose a solution relying on hash-chain based authenticators for authenticating logs that ensure the authenticity, the integrity of logs, and the user accountability. We present algorithms to construct authenticators and verify logs. We prove their correctness and provide theoretical and practical evaluations.
Description
Keywords
Citation
URI
Collections
Endorsement
Review
Supplemented By
Referenced By
Number of citations to item: 2
- Claudia-Lavinia Ignat, Quang-Vinh Dang (2021): Users trust assessment based on their past behavior in large scale collaboration, In: 2021 IEEE 17th International Conference on Intelligent Computer Communication and Processing (ICCP), doi:10.1109/iccp53602.2021.9733490
- Victorien Elvinger, Gerald Oster, Francois Charoy (2018): Prunable Authenticated Log and Authenticable Snapshot in Distributed Collaborative Systems, In: 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), doi:10.1109/cic.2018.00031