Abstract
The emerging issues of personal and network mobility have created a need for the decoupling of identity from location in Internet addressing. This decoupling requires name resolution systems that can provide scalable resolution of globally unique persistent identifiers of communication endpoints, which may be users, devices, content or services. Recent developments in structured peer-to-peer overlay networks have made possible the scalable resolution of flat names, which opens up new possibilities in the area of naming and name resolution systems. In this paper we propose a scheme to provide authentication and verification in a name resolution system based on structured peer to peer networks such as distributed hash tables (DHTs). We specify how namespace security and global uniqueness may be managed with the use of public key cryptography. We also propose a framework within which independent overlay networks may compose a global namespace.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mislove, A., Druschel, P.: Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays. In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol. 3279, pp. 162–172. Springer, Heidelberg (2004)
Nikander, P., Ylitalo, J., Wall, J.: Integrating Security, Mobility, and Multi-Homing in a HIP Way. In: NDSS (2003)
Balakrishnan, H., Lakshminarayanan, K., Ratnasamy, S., Shenker, S., Stoica, I., Walfish, M.: A Layered Naming Architecture for the Internet. In: SIGCOMM (2004)
Walfish, M., Balakrishnan, H., Shenker, S.: Untangling the Web from DNS. In: NSDIS (2004)
Ford, B.: Unmanaged Internet Protocol: Taming the edge network management crisis. In: HotNets-II (2003)
Castro, M., Drushel, P., Ganesh, A., Rowstron, A., Wallach, D.: Secure routing for structured peer-to-peer overlay networks. In: OSDI (2002)
Dabek, F., Zhao, B.Y., Druschel, P., Kubiatowicz, J., Stoica, I.: Towards a Common API for Structured Peer-to-Peer Overlays. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735. Springer, Heidelberg (2003)
Clark, D., Braden, R., Falk, A., Pingali, V.: FARA: Reorganizing the Addressing Architecture. In: ACM SIGCOMM (2003)
Mazieres, D., Kaminsky, M., Kaashoek, M.F., Witchel, E.: Separating key management from file system security. In: SOSP (1999)
Balakrishnan, H., Kaashoek, M.F., Karger, D., Morris, R.: Looking up data in P2P systems. In: CACM (February 2003)
Eriksson, J., Faloutsos, M., Krishnamurthy, S.: PeerNet: Pushing peer-to-peer down the stack. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735. Springer, Heidelberg (2003)
Snoeren, A.C., Balakrishnan, H.: An end-to-end approach to host mobility. In: Mobicom (2000)
Snoeren, A.C., Balakrishnan, H., Kaashoek, M.F.: Reconsidering Internet mobility. In: HotOS-VIII (2001)
Stoica, I., Morris, R., Liben-Nowell, D., et al.: Chord: A scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Transactions on Networking, (February 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Herborn, S., Hu, T.HT., Boreli, R., Seneviratne, A. (2005). Secure Identity and Location Decoupling Using Peer-to-Peer Networks. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_70
Download citation
DOI: https://doi.org/10.1007/978-3-540-31957-3_70
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25338-9
Online ISBN: 978-3-540-31957-3
eBook Packages: Computer ScienceComputer Science (R0)