Securing communication in a peer-to-peer messaging middleware

被引:0
|
作者
Szilagyi, Peter [1 ,2 ]
机构
[1] Univ Babes Bolyai, Dept Math & Comp Sci, R-3400 Cluj Napoca, Romania
[2] Eotvos Lorand Univ, Sch Informat, Budapest, Hungary
关键词
D O I
10.1109/SYNASC.2013.50
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditionally, message oriented middlewares (MOM) are looked upon as either centralized systems (e.g. AMQP) or a rigidly distributed collection of machines, requiring significant configuration overhead for achieving the desired throughput under the needed security constraints. On the other end of the spectrum, peer-to-peer systems (P2P) in general achieve amazing scalability and fault tolerance, but due to their very nature, are susceptible to various attacks. Since all measures of security have considerable consequences on the system's capabilities, the securing of a peer-to-peer system requires a thorough analysis on the exact designated use-case and environment in which the network is required to operate in, as well as all the possible threats the system must be able to withstand. The paper proposes a security model that bridges the distribution concept of peer-to-peer systems with the necessities of MOMs by rigorously defining the operational environment, assumptions and requirements, on top of which a security protocol was implemented. Taking advantage of the specific use case of P2P MOMs, further optimizations are provided which provide the same security against the defined threat model, but result in significant gains with regard to the overall switching throughput of the network.
引用
收藏
页码:329 / 335
页数:7
相关论文
共 50 条
  • [1] Ad-hoc messaging infrastructure for peer-to-peer communication
    Michael Lescisin
    Qusay H. Mahmoud
    Peer-to-Peer Networking and Applications, 2019, 12 : 60 - 73
  • [2] Ad-hoc messaging infrastructure for peer-to-peer communication
    Lescisin, Michael
    Mahmoud, Qusay H.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) : 60 - 73
  • [3] CONFIIT: a middleware for peer-to-peer computing
    Oliver Flauzac
    Michael Krajecki
    Luiz-Angelo Steffenel
    The Journal of Supercomputing, 2010, 53 : 86 - 102
  • [4] CONFIIT: a middleware for peer-to-peer computing
    Flauzac, Oliver
    Krajecki, Michael
    Steffenel, Luiz-Angelo
    JOURNAL OF SUPERCOMPUTING, 2010, 53 (01): : 86 - 102
  • [5] Peer-to-Peer Communication on Android-Based Mobile Devices: Middleware and Protocols
    Jabbar, Waheb A.
    Ismail, M.
    Nordin, R.
    2013 5TH INTERNATIONAL CONFERENCE ON MODELING, SIMULATION AND APPLIED OPTIMIZATION (ICMSAO), 2013,
  • [6] A peer-to-peer approach to enhance middleware connectivity
    Klintskog, E
    Mesaros, V
    El Banna, Z
    Brand, P
    Haridi, S
    PRINCIPLES OF DISTRIBUTED SYSTEMS, 2004, 3144 : 71 - 82
  • [7] A middleware for job distribution in peer-to-peer networks
    Fischer, Thomas
    Fudeus, Stephan
    Merz, Peter
    APPLIED PARALLEL COMPUTING: STATE OF THE ART IN SCIENTIFIC COMPUTING, 2007, 4699 : 1147 - +
  • [8] Securing peer-to-peer distributions for mobile devices
    Osterhues, Andre
    Sadeghi, Ahmad-Reza
    Wolf, Marko
    Stueble, Christian
    Asokan, N.
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 161 - +
  • [9] A peer-to-peer communication system
    Li, Y
    Li, J
    Yu, K
    Wang, KB
    Li, SP
    Zhang, YQ
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2002, PROCEEDING, 2002, 2532 : 873 - 879
  • [10] Reputation in peer-to-peer communication
    Hussain, FK
    Chang, E
    Dillon, T
    IC'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2004, : 269 - 271