Securing Identity Assignment Using Implicit Certificates in P2P Overlays
نویسندگان
چکیده
The security of the Peer-to-Peer (P2P) overlays networks has been questioned for years. Many works have been proposed to provide secure routing, anonymity, reputation systems, confidentiality, etc. However, the identity assignment has been less considered. These networks are designed so that each user has a unique identifier (nodeID), but the most of identity assignment systems allow malicious users to obtain a set of nodeIDs or even select certain identifiers. Thus, these users can disrupt the proper operation of a P2P overlay. In this paper, we propose a nodeID assignment protocol based on the issue of implicit certificates. Our purpose is to provide security services to struggle against the most of security threats in these networks with special attention to the identity assignment. This approach is based on the use of certificates and the joint generation of nodeIDs between a Certification Authority (CA) and the user. In addition, the use of implicit certificates presents certain advantages over the use of traditional certificates (explicit certificates).
منابع مشابه
A Security and Trust Framework for Agent-based P2P E-commerce
P2P based e-commerce (EC) is becoming increasingly significant where security and trust are two of the most critical issues. This paper discusses and proposes a secure infrastructure with peer certificates aiming at easing the involvement of CA (Certificate Authority) and enabling the framework for securing peers and the communication between them. This paper also proposes a novel two-phase tru...
متن کاملA Performance Evaluation Framework for Mobile P2P Overlays under Churn
With the popular use of the mobile intelligence equipment, including smartphones and mobile tablets, mobile peer-to-peer (P2P) networks have become increasingly important. In recent years some mobile P2P overlays have been proposed. We propose a three-dimension evaluation framework for mobile P2P overlays under churn. Three P2P overlays, named as GIA, M-GIA, and KCCO(k-Clique Community Overlay)...
متن کاملMapping the PPLive Network: Studying the Impacts of Media Streaming on P2P Overlays
While several deployed p2p le sharing overlays have been characterized in the literature, this paper shows that some of their conclusions may be false for p2p applications that stream media instead. Speci cally, we undertake a crawler-based investigation of PPLive, the largest live multimedia streaming system in the world today. It is important to understand IPTV overlays like PPLive in order...
متن کاملCertificates-as-an-Insurance: Incentivizing Accountability in SSL/TLS
We propose to leverage accountability mechanisms to deal with trust-related security incidents of certification authorities (CAs) in the SSL/TLS public-key infrastructure (PKI). We argue that, despite recent advances in securing certificate issuance and verification, the TLS PKI does not sufficiently incentivize careful identity verification by CAs during certificate issuance or provide CA acco...
متن کاملGossip-based Peer Sampling in Social Overlays
Performance of many P2P systems depends on the ability to construct a random overlay network among the nodes. Current state-of-the-art techniques for constructing random overlays have an implicit requirement that any two nodes in the system should always be able to communicate and establish a link between them. However, this is not the case in some of the environments where distributed systems ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013