Eavesdropping games: A graph-theoretic approach to privacy in distributed systems

Citation
M. Franklin et al., Eavesdropping games: A graph-theoretic approach to privacy in distributed systems, J ACM, 47(2), 2000, pp. 225-243
Citations number
20
Categorie Soggetti
Computer Science & Engineering
Journal title
Volume
47
Issue
2
Year of publication
2000
Pages
225 - 243
Database
ISI
SICI code
Abstract
We initiate a graph-theoretic study of privacy in distributed environments with mobile eavesdroppers ("bugs"). For two privacy tasks-distributed datab ase maintenance and message transmission-a computationally unbounded advers ary "plays an eavesdropping game," coordinating the movement of the bugs am ong the sites to learn the current memory contents. Many different adversar ies are considered, motivated by differences in eavesdropping technologies. We characterize the feasibility of the two privacy tasks combinatorially, construct protocols for the feasible cases, and analyze their computational complexity.