skip to main content
10.1145/1582379.1582582acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

Security concept for peer-to-peer systems

Published:21 June 2009Publication History

ABSTRACT

Peer-to-peer systems have the ability to connect network nodes in a convenient and simple manner. Thus, they are used in a broad range of applications to connect nodes with different capabilities in terms of computational power, memory and energy. For all these peer-to-peer systems there doesn't exist a coherent and dynamic security concept which allows application designers to simply specify their security requirements and are thereafter offered security features to protect applications against threats. In this paper we outline a general peer-to-peer model offering a dynamic security concept which allows for simple selection of an appropriate security level.

References

  1. S. Crocker, "Host software," RFC 1, Internet Engineering Task Force, April 1969. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev., 36(SI):299--314, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. I. Clarke, O. S, O. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies. Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, volume 2009/2001, pages 46--66, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. JXTA#8482; Community Project. JXTA v2.0 protocols specification, Oktober 2007.Google ScholarGoogle Scholar
  5. S. Kraxberger. Secure peer-to-peer framework (SePP), 2009. https://sourceforge.net/projects/securep2p/.Google ScholarGoogle Scholar
  6. J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. Oceanstore: An architecture for global-scale persistent storage. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, November 12--15 2000. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker. A scalable content-addressable network. In SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages 161--172, New York, NY, USA, 2001. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Rowstron and P. Druschel. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Lecture Notes in Computer Science, pages 329--350, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages 149--160, New York, NY, USA, 2001. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. The Gnutella Developer Forum. The Annotated Gnutella Protocol Specification v0.4, January 2009.Google ScholarGoogle Scholar
  11. H. Wang, Y. Zhu, and Y. Hu. An efficient and secure peer-to-peer overlay network. In LCN '05: Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary, pages 764--771, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. W. Yeager and J. Williams. Secure peer-to-peer networking: The jxta example. IT Professional, 4(2):53--57, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Y. Zhao, J. Kubiatowicz, and A. D. Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical report, UC Berkeley, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security concept for peer-to-peer systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
        June 2009
        1561 pages
        ISBN:9781605585697
        DOI:10.1145/1582379

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 June 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader