A Secure Quorum Based Membership Mechanism for P2P Systems
نویسندگان
چکیده
Closed user group based on a Peer-to-Peer system require a membership mechanism that is fully decentralized. Several suggestions have been made in the literature. However, the proposed mechanisms have some significant drawbacks since any peer can easily bypass the proposed membership mechanism. In this paper we present a new fully decentralized and secure membership mechanism for Peer-to-Peer systems. A quorum of peers decides about membership requests from new peers. In order to prevent the requesting peer from manipulating the membership decision two mechanisms are applied: (1) The quorum peers must make there membership decision unanimously. This is sufficient to guarantee a correct membership decision, if a fraction of the peers in the P2P system is honest and if the quorum peers are selected in a random manner. (2) In order to ensure a random selection of the quorum peer a random value is created in a distributed way that is used to select the quorum. It can be verified, that the quorum was correctly selected. The presented mechanism is evaluated in terms of the offered security and the created traffic overhead.
منابع مشابه
A Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory
The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...
متن کاملIdentity-Based Access Control for Ad Hoc Groups
The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms for admission as well as revocation/eviction of group members. Particularly in ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs), secure group admission is needed to bootstrap other group se...
متن کاملDoes Proactive Secret Sharing Perform in Peer-to-Peer Systems?
Trustworthy applications in fully decentralized systems require a trust anchor. This paper describes how such an anchor can be implemented efficiently in p2p systems. The basic concept is to use threshold cryptography in order to sign messages by a quorum of peers. The focus is put on advanced mechanisms to secure the shares of the secret key over time, using proactive secret sharing. This mech...
متن کاملA Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کاملA Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory
The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...
متن کامل