Skip to main content

Secure Identity and Location Decoupling Using Peer-to-Peer Networks

  • Conference paper
Networking - ICN 2005 (ICN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3421))

Included in the following conference series:

Abstract

The emerging issues of personal and network mobility have created a need for the decoupling of identity from location in Internet addressing. This decoupling requires name resolution systems that can provide scalable resolution of globally unique persistent identifiers of communication endpoints, which may be users, devices, content or services. Recent developments in structured peer-to-peer overlay networks have made possible the scalable resolution of flat names, which opens up new possibilities in the area of naming and name resolution systems. In this paper we propose a scheme to provide authentication and verification in a name resolution system based on structured peer to peer networks such as distributed hash tables (DHTs). We specify how namespace security and global uniqueness may be managed with the use of public key cryptography. We also propose a framework within which independent overlay networks may compose a global namespace.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mislove, A., Druschel, P.: Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays. In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol. 3279, pp. 162–172. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  2. Nikander, P., Ylitalo, J., Wall, J.: Integrating Security, Mobility, and Multi-Homing in a HIP Way. In: NDSS (2003)

    Google Scholar 

  3. Balakrishnan, H., Lakshminarayanan, K., Ratnasamy, S., Shenker, S., Stoica, I., Walfish, M.: A Layered Naming Architecture for the Internet. In: SIGCOMM (2004)

    Google Scholar 

  4. Walfish, M., Balakrishnan, H., Shenker, S.: Untangling the Web from DNS. In: NSDIS (2004)

    Google Scholar 

  5. Ford, B.: Unmanaged Internet Protocol: Taming the edge network management crisis. In: HotNets-II (2003)

    Google Scholar 

  6. Castro, M., Drushel, P., Ganesh, A., Rowstron, A., Wallach, D.: Secure routing for structured peer-to-peer overlay networks. In: OSDI (2002)

    Google Scholar 

  7. Dabek, F., Zhao, B.Y., Druschel, P., Kubiatowicz, J., Stoica, I.: Towards a Common API for Structured Peer-to-Peer Overlays. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Clark, D., Braden, R., Falk, A., Pingali, V.: FARA: Reorganizing the Addressing Architecture. In: ACM SIGCOMM (2003)

    Google Scholar 

  9. Mazieres, D., Kaminsky, M., Kaashoek, M.F., Witchel, E.: Separating key management from file system security. In: SOSP (1999)

    Google Scholar 

  10. Balakrishnan, H., Kaashoek, M.F., Karger, D., Morris, R.: Looking up data in P2P systems. In: CACM (February 2003)

    Google Scholar 

  11. Eriksson, J., Faloutsos, M., Krishnamurthy, S.: PeerNet: Pushing peer-to-peer down the stack. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Snoeren, A.C., Balakrishnan, H.: An end-to-end approach to host mobility. In: Mobicom (2000)

    Google Scholar 

  13. Snoeren, A.C., Balakrishnan, H., Kaashoek, M.F.: Reconsidering Internet mobility. In: HotOS-VIII (2001)

    Google Scholar 

  14. Stoica, I., Morris, R., Liben-Nowell, D., et al.: Chord: A scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Transactions on Networking, (February 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Herborn, S., Hu, T.HT., Boreli, R., Seneviratne, A. (2005). Secure Identity and Location Decoupling Using Peer-to-Peer Networks. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_70

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31957-3_70

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25338-9

  • Online ISBN: 978-3-540-31957-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics