Trustworthy Peer-to-peer Infrastructure Using Hardware Based Security
نویسنده
چکیده
Peer-to-Peer (P2P) infrastructure, thanks to its scalability, has been used for designing many large-scale distributed systems. Of the two types of P2P infrastructure: unstructured and structured, the latter has received a greater amount of research attention. Security is one of many challenging problems faced by existing systems based on structured P2P. Having trust in such the P2P environments can help mitigate many problems including security, because peers can choose to only interact with the ones that are deemed trustworthy. However, there exists numerous hurdles that need to be overcome before a reliable trust infrastructure (or trust system) can be implemented for P2P. This thesis investigates and seeks to improve the existing reputation metrics and feedback mechanisms which are important components of the trust system. It shows the limitations of existing reputations metrics and feedback mechanisms, then proposes new algorithms and protocols addressing these limitations. The new reputation metrics are more resilient to manipulations, and they take into account negative feedback. The new protocols are designed as parts of the feedback mechanisms, and they allow an honest peer in a structured P2P system to securely detect if another peer has misbehaved. The mechanism for detecting misbehavior has proved difficult in structured P2P, and has not been considered by existing feedback mechanisms. The new protocols leverage hardware-based security which is in the form of trusted devices. Some protocols utilize the Trusted Platform Modules which are currently available at high-ends computers. The others make use of the newly proposed trusted hardware called Trusted Token Modules. The protocols concerning the detection of misbehavior in structured P2P routing are analyzed in this thesis using both formal methods and simulations. CSP is used to model and verify the properties of these protocols. The performance of these protocols is then evaluated using the newly proposed, distributed simulation platform called dPeerSim.
منابع مشابه
Distributing security-mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and prototype that addresses its trust and scalability problems. We use trusted computing platforms linked with peer-to-peer networks to create a network of trustworthy mediators and improve availability. We use threshold crypt...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملRouting with Confidence: A Model for Trustworthy Communication
We present a model for trustworthy communication with respect to security and privacy in heterogeneous networks. In general, existing privacy protocols assume independently operated nodes spread over the Internet. Most of the analysis of these protocols has assumed a fraction of colluding nodes picked at random. While these approaches provide promising guarantees of anonymity for such attack mo...
متن کاملDynamic fingerprints: improving the usability of peer-to-peer authentication
Peer-to-peer technology and wireless networking offer great potential for working together away from the desk – but they also introduce unique security challenges. A key aspect of that security is ensuring the identity of a peer user in the network (i.e., authentication) when standard server-based mechanisms are not available. Authentication is meant to foil the eavesdropping intruder who masqu...
متن کامل