Abstract
CodiP2P is a distributed platform for computation based on the peer-to-peer paradigm. This article presents a novel distributed authentication method that suits the platform and adapts to its characteristics. The developed method is based on the Web of Trust paradigm, i.e., not depending on a traditional PKI infrastructure, and focuses on efficiency both in the number of messages transmitted and digital signatures processed by exploiting the inherent locality found in the platform. As part of the method, a reliable and efficient distributed public key repository is developed taking CoDiP2P’s de Bruijn topology as a cornerstone.




Similar content being viewed by others
References
Castell D, Barri I, Rius J, Giné F, Solsona F, Guirado F (2008) CoDiP2P: a peer-to-peer architecture for sharing computing resources. In: Int symp on distr computing and artificial intelligence 2008 (DCAI 2008). Advances in soft computing, vol 50, pp 293–303
Anderson DP (2004) BOINC: a system for public-resource computing and storage. In: Fifth IEEE/ACM international workshop on grid computing, pp 4–10
Omar M, Challal Y, Bouabdallah A (2009) Reliable and fully distributed trust model for mobile ad hoc networks. Comput Secur 28(3–4):199–214
Oh B, Lee S, Park H (2008) A peer mutual authentication method on super peer based peer-to-peer network. In: IEEE int symp on consumer electronics, pp 1–4
Josephson W, Sirer E, Schneider F (2005) Peer-to-peer authentication with a distributed single sign-on service. In: Peer-to-peer systems III. LNCS, vol 3259, pp 250–258
Li Z, Xu X, Shi L, Liu J, Liang C (2009) Authentication in peer-to-peer network: survey and research directions. In: International conference on network and system security, pp 115–122
Takeda A, Chakraborty D, Kitagata G, Hashimoto K, Shiratori N (2009) Proposal and performance evaluation of hash-based authentication for P2P network. Inf Media Technol 4(2):594–606
Takeda A, Hashimoto K, Kitagata G, Zabir SMS, Kinoshita T, Shiratori N (2008) A new authentication method with distributed hash table for p2p network. In: Proceedings of the 22nd international conference on advanced information networking and applications—workshops, AINAW’08, pp 483–488
Liu H, Luo P, Wang D (2008) A scalable authentication model based on public keys. J Netw Comput Appl 31(4):375–386
Ngai adn ECH, Lyu MR (2004) Trust- and clustering-based authentication services in mobile ad hoc networks. In: Proc 2nd international workshop on mobile distributed computing (MDC’04), pp 582–587
Zhang Y, Li X, Huai J, Liu Y (2005) Access control in peer-to-peer collaborative systems. In: 25th international conference on distributed computing systems workshop on mobility of peer-to-peer systems
Zhang Y, Li X, Huai J, Liu Y (2005) Access control in peer-to-peer collaborative systems. In: 25th IEEE int conf on distr computing systems workshops, pp 835–840
Aberer K, Datta A, Hauswirth M (2004) Efficient, self-contained handling of identity in peer-to-peer systems. IEEE Trans Knowl Data Eng 17:858–869
de Bruijn N (1946) A combinatorial problem. Proc K Ned Akad Wet 49:758–764
il Jeong K, Yoon U, Han J, Ahn J, Song J, Kim S (2008) Rnet: a hierarchical P2P overlay network for improving locality in a mobile environment. In: Int conf on networked computing and advanced information management, vol 1, pp 623–630
Canetti R (2000) Security and composition of multiparty cryptographic protocols. J Cryptol 13(1):143–202
Douceur J (2002) The sybil attack. In: First int workshop on p2p systems, pp 251–260
Karger D, Lehman E, Leighton T, Panigrahy R, Levine M, Lewin D (1997) Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web. In: Proc of the 29th ACM on theory of computing, pp 654–663
Dinger J, Waldhorst O (2009) Decentralized bootstrapping of p2p systems: a practical view. In: NETWORKING 2009. LNCS, vol 5550, pp 703–715
Stoica I, Morris R, Liben-Nowell D, Karger DR, Kaashoek MF, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Trans Netw 11(1):17–32
Rodriguez P, Spanner C, Biersack EW (2001) Analysis of web caching architectures: hierarchical and distributed caching. IEEE/ACM Trans Netw 9(4):404–418
Acknowledgements
This work is supported by the CAPAP-H3 network (TIN2010-12011-E), the Spanish Ministry of Science and Innovation (TIN2008-01117 and TIN2011-28689-C02-02), and Junta de Andalucía (P11-TIC-7176), in part financed by the European Regional Development Fund (ERDF).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Naranjo, J.A.M., Cores, F., Casado, L.G. et al. Fully distributed authentication with locality exploitation for the CoDiP2P peer-to-peer computing platform. J Supercomput 65, 1037–1049 (2013). https://doi.org/10.1007/s11227-012-0842-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-012-0842-2