Skip to main content
Log in

Fully distributed authentication with locality exploitation for the CoDiP2P peer-to-peer computing platform

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

CodiP2P is a distributed platform for computation based on the peer-to-peer paradigm. This article presents a novel distributed authentication method that suits the platform and adapts to its characteristics. The developed method is based on the Web of Trust paradigm, i.e., not depending on a traditional PKI infrastructure, and focuses on efficiency both in the number of messages transmitted and digital signatures processed by exploiting the inherent locality found in the platform. As part of the method, a reliable and efficient distributed public key repository is developed taking CoDiP2P’s de Bruijn topology as a cornerstone.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Algorithm 1
Algorithm 2
Fig. 2

Similar content being viewed by others

References

  1. Castell D, Barri I, Rius J, Giné F, Solsona F, Guirado F (2008) CoDiP2P: a peer-to-peer architecture for sharing computing resources. In: Int symp on distr computing and artificial intelligence 2008 (DCAI 2008). Advances in soft computing, vol 50, pp 293–303

    Chapter  Google Scholar 

  2. Anderson DP (2004) BOINC: a system for public-resource computing and storage. In: Fifth IEEE/ACM international workshop on grid computing, pp 4–10

    Chapter  Google Scholar 

  3. Omar M, Challal Y, Bouabdallah A (2009) Reliable and fully distributed trust model for mobile ad hoc networks. Comput Secur 28(3–4):199–214

    Article  Google Scholar 

  4. Oh B, Lee S, Park H (2008) A peer mutual authentication method on super peer based peer-to-peer network. In: IEEE int symp on consumer electronics, pp 1–4

    Google Scholar 

  5. Josephson W, Sirer E, Schneider F (2005) Peer-to-peer authentication with a distributed single sign-on service. In: Peer-to-peer systems III. LNCS, vol 3259, pp 250–258

    Chapter  Google Scholar 

  6. Li Z, Xu X, Shi L, Liu J, Liang C (2009) Authentication in peer-to-peer network: survey and research directions. In: International conference on network and system security, pp 115–122

    Google Scholar 

  7. Takeda A, Chakraborty D, Kitagata G, Hashimoto K, Shiratori N (2009) Proposal and performance evaluation of hash-based authentication for P2P network. Inf Media Technol 4(2):594–606

    Google Scholar 

  8. Takeda A, Hashimoto K, Kitagata G, Zabir SMS, Kinoshita T, Shiratori N (2008) A new authentication method with distributed hash table for p2p network. In: Proceedings of the 22nd international conference on advanced information networking and applications—workshops, AINAW’08, pp 483–488

    Google Scholar 

  9. Liu H, Luo P, Wang D (2008) A scalable authentication model based on public keys. J Netw Comput Appl 31(4):375–386

    Article  Google Scholar 

  10. Ngai adn ECH, Lyu MR (2004) Trust- and clustering-based authentication services in mobile ad hoc networks. In: Proc 2nd international workshop on mobile distributed computing (MDC’04), pp 582–587

    Google Scholar 

  11. Zhang Y, Li X, Huai J, Liu Y (2005) Access control in peer-to-peer collaborative systems. In: 25th international conference on distributed computing systems workshop on mobility of peer-to-peer systems

    Google Scholar 

  12. Zhang Y, Li X, Huai J, Liu Y (2005) Access control in peer-to-peer collaborative systems. In: 25th IEEE int conf on distr computing systems workshops, pp 835–840

    Chapter  Google Scholar 

  13. Aberer K, Datta A, Hauswirth M (2004) Efficient, self-contained handling of identity in peer-to-peer systems. IEEE Trans Knowl Data Eng 17:858–869

    Article  Google Scholar 

  14. de Bruijn N (1946) A combinatorial problem. Proc K Ned Akad Wet 49:758–764

    MATH  Google Scholar 

  15. il Jeong K, Yoon U, Han J, Ahn J, Song J, Kim S (2008) Rnet: a hierarchical P2P overlay network for improving locality in a mobile environment. In: Int conf on networked computing and advanced information management, vol 1, pp 623–630

    Google Scholar 

  16. Canetti R (2000) Security and composition of multiparty cryptographic protocols. J Cryptol 13(1):143–202

    Article  MathSciNet  MATH  Google Scholar 

  17. Douceur J (2002) The sybil attack. In: First int workshop on p2p systems, pp 251–260

    Google Scholar 

  18. Karger D, Lehman E, Leighton T, Panigrahy R, Levine M, Lewin D (1997) Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web. In: Proc of the 29th ACM on theory of computing, pp 654–663

    Google Scholar 

  19. Dinger J, Waldhorst O (2009) Decentralized bootstrapping of p2p systems: a practical view. In: NETWORKING 2009. LNCS, vol 5550, pp 703–715

    Chapter  Google Scholar 

  20. Stoica I, Morris R, Liben-Nowell D, Karger DR, Kaashoek MF, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Trans Netw 11(1):17–32

    Article  Google Scholar 

  21. Rodriguez P, Spanner C, Biersack EW (2001) Analysis of web caching architectures: hierarchical and distributed caching. IEEE/ACM Trans Netw 9(4):404–418

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the CAPAP-H3 network (TIN2010-12011-E), the Spanish Ministry of Science and Innovation (TIN2008-01117 and TIN2011-28689-C02-02), and Junta de Andalucía (P11-TIC-7176), in part financed by the European Regional Development Fund (ERDF).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. A. M. Naranjo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Naranjo, J.A.M., Cores, F., Casado, L.G. et al. Fully distributed authentication with locality exploitation for the CoDiP2P peer-to-peer computing platform. J Supercomput 65, 1037–1049 (2013). https://doi.org/10.1007/s11227-012-0842-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-012-0842-2

Keywords

Navigation