ABSTRACT
Peer-to-peer systems have the ability to connect network nodes in a convenient and simple manner. Thus, they are used in a broad range of applications to connect nodes with different capabilities in terms of computational power, memory and energy. For all these peer-to-peer systems there doesn't exist a coherent and dynamic security concept which allows application designers to simply specify their security requirements and are thereafter offered security features to protect applications against threats. In this paper we outline a general peer-to-peer model offering a dynamic security concept which allows for simple selection of an appropriate security level.
- S. Crocker, "Host software," RFC 1, Internet Engineering Task Force, April 1969. Google ScholarDigital Library
- M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev., 36(SI):299--314, 2002. Google ScholarDigital Library
- I. Clarke, O. S, O. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies. Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, volume 2009/2001, pages 46--66, 2000. Google ScholarDigital Library
- JXTA#8482; Community Project. JXTA v2.0 protocols specification, Oktober 2007.Google Scholar
- S. Kraxberger. Secure peer-to-peer framework (SePP), 2009. https://sourceforge.net/projects/securep2p/.Google Scholar
- J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. Oceanstore: An architecture for global-scale persistent storage. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, November 12--15 2000. ACM. Google ScholarDigital Library
- S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker. A scalable content-addressable network. In SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages 161--172, New York, NY, USA, 2001. ACM. Google ScholarDigital Library
- A. Rowstron and P. Druschel. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Lecture Notes in Computer Science, pages 329--350, 2001. Google ScholarDigital Library
- I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages 149--160, New York, NY, USA, 2001. ACM. Google ScholarDigital Library
- The Gnutella Developer Forum. The Annotated Gnutella Protocol Specification v0.4, January 2009.Google Scholar
- H. Wang, Y. Zhu, and Y. Hu. An efficient and secure peer-to-peer overlay network. In LCN '05: Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary, pages 764--771, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarDigital Library
- W. Yeager and J. Williams. Secure peer-to-peer networking: The jxta example. IT Professional, 4(2):53--57, 2002. Google ScholarDigital Library
- B. Y. Zhao, J. Kubiatowicz, and A. D. Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical report, UC Berkeley, 2001. Google ScholarDigital Library
Index Terms
- Security concept for peer-to-peer systems
Recommendations
An Efficient Hybrid Peer-to-Peer System for Distributed Data Sharing
Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected ...
Peer-to-peer multimedia applications
MM '06: Proceedings of the 14th ACM international conference on MultimediaIn both academia and industry, peer-to-peer (P2P) applications have attracted great attention. Peer-to-peer file sharing applications, such as Napster, Gnutella, Kazaa, BitTorrent, Skype and PPLive, have witnessed tremendous success among end users. And ...
On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks
Unstructured peer-to-peer (P2P) file-sharing networks are popular in the mass market. As the peers participating in unstructured networks interconnect randomly, they rely on flooding query messages to discover objects of interest and thus introduce ...
Comments