Handling Identity in Peer-to-Peer Systems

نویسندگان

  • Manfred Hauswirth
  • Anwitaman Datta
  • Karl Aberer
چکیده

As IP addresses have become a scarce resource most computers on the Internet no longer have permanent addresses. For client computers this is usually not a big problem but with the advent of P2P systems, where every computer acts both as a client and as a server, this has become increasingly problematic. In advanced P2P systems ad-hoc connections to peers have to be established, which can only be done if the receiving peer has a permanent IP address. In this paper we propose an approach for a completely decentralized, self-maintaining, light-weight, and sufficiently secure peer identification service that allows us to consistently map unique peer identifications onto dynamic IP addresses in environments with low online probability of the peers constituting the service. For security we apply a combination of PGPlike public key distribution and a quorum-based query scheme. We describe the algorithm as implemented in our P-Grid P2P lookup system and give a detailed analytical performance analysis demonstrating the efficiency and robustness of our approach. Our approach also can easily be adapted to other application domains, i.e., be used for other name services, because we do not impose any constraints on the type of mappings.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Genetic Programming-based trust model for P2P Networks

Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...

متن کامل

نقش واسطه ای هویت معنوی در رابطه بین دلبستگی به والدین و همسالان با تاب‌آوری

Spiritual identity defined as self identification based on spirituality and spiritual experiences, has gained increasing attention during recent years. Considering the phenomenological nature of spirituality and difficulties in its measurement, the scientific study of spiritual identity as a unified construct began a few decades ago. Considering the fact that very little quantitative research i...

متن کامل

TAC: A Topology-Aware Chord-based Peer-to-Peer Network

Among structured Peer-to-Peer systems, Chord has a general popularity due to its salient features like simplicity, high scalability, small path length with respect to network size, and flexibility on node join and departure. However, Chord doesn’t take into account the topology of underlying physical network when a new node is being added to the system, thus resulting in high routing late...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

Peer-reading Process and Its Ethical Challenges: Can We Hope for Moral Judgment?

Background: The role of refereeing and peer-reading in the ethics of research and publishing is very privileged and vital, and changes have occurred in this important part of scientific communication over the years. Despite the diversity in scientific judgments and the criticisms and challenges that have been brought to its implementation and nature, it is still accepted as a social norm in the...

متن کامل

Identity Crisis: Anonymity vs. Reputation in P2P Systems

The effectiveness of reputation systems for peer-to-peer resource-sharing networks is largely dependent on the reliability of the identities used by peers in the network. Much debate has centered around how closely one’s pseudoidentity in the network should be tied to their real-world identity, and how that identity is protected from malicious spoofing. In this paper we investigate the cost in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003