Securing communication in a peer-to-peer messaging middleware

被引:0
|
作者
Szilagyi, Peter [1 ,2 ]
机构
[1] Univ Babes Bolyai, Dept Math & Comp Sci, R-3400 Cluj Napoca, Romania
[2] Eotvos Lorand Univ, Sch Informat, Budapest, Hungary
关键词
D O I
10.1109/SYNASC.2013.50
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditionally, message oriented middlewares (MOM) are looked upon as either centralized systems (e.g. AMQP) or a rigidly distributed collection of machines, requiring significant configuration overhead for achieving the desired throughput under the needed security constraints. On the other end of the spectrum, peer-to-peer systems (P2P) in general achieve amazing scalability and fault tolerance, but due to their very nature, are susceptible to various attacks. Since all measures of security have considerable consequences on the system's capabilities, the securing of a peer-to-peer system requires a thorough analysis on the exact designated use-case and environment in which the network is required to operate in, as well as all the possible threats the system must be able to withstand. The paper proposes a security model that bridges the distribution concept of peer-to-peer systems with the necessities of MOMs by rigorously defining the operational environment, assumptions and requirements, on top of which a security protocol was implemented. Taking advantage of the specific use case of P2P MOMs, further optimizations are provided which provide the same security against the defined threat model, but result in significant gains with regard to the overall switching throughput of the network.
引用
收藏
页码:329 / 335
页数:7
相关论文
共 50 条
  • [31] Analysis of Peer-to-Peer SIP in a Distributed Mobile Middleware System
    Harjula, Erkki
    Ala-Kurikka, Jussi
    Howie, Douglas
    Ylianttila, Mika
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [32] Munin: A Peer-to-Peer Middleware for Ubiquitous Analytics and Visualization Spaces
    Badam, Sriram Karthik
    Fisher, Eli
    Elmqvist, Niklas
    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2015, 21 (02) : 215 - 228
  • [33] DMW - A middleware for digital rights management in peer-to-peer networks
    Kumar, P
    Sridhar, G
    Sridhar, V
    Gadh, R
    Sixteenth International Workshop on Database and Expert Systems Applications, Proceedings, 2005, : 246 - 250
  • [34] Towards an autonomic peer-to-peer middleware for wireless sensor networks
    Moergenthaler, Reinhard
    Zeller, Markus
    Jiru, Josef
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 358 - 372
  • [35] MATCH: A Decentralized Middleware for Fair Matchmaking In Peer-to-Peer Markets
    de Vos, Martijn
    Ishmaev, Georgy
    Pouwelse, Johan
    PROCEEDINGS OF THE 2020 21ST INTERNATIONAL MIDDLEWARE CONFERENCE (MIDDLEWARE '20), 2020, : 74 - 88
  • [36] A grid middleware for data management exploiting peer-to-peer techniques
    Asiki, Athanasia
    Doka, Katerina
    Konstantinou, Ioannis
    Zissimos, Antonis
    Tsoumakos, Dimitrios
    Koziris, Nectarios
    Tsanakas, Panayiotis
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (04): : 426 - 435
  • [37] A Control Layer for a Peer-to-Peer Middleware Using Behavior Semantics
    Haidar, Hassan
    Kalakech, Ali
    Hamie, Ali
    Querrec, Ronan
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP), 2015, : 155 - 162
  • [38] Co-Operative Peer-to-Peer Systems for Industrial Middleware
    Ismail, Ahmed
    Kastner, Wolfgang
    2016 IEEE WORLD CONFERENCE ON FACTORY COMMUNICATION SYSTEMS (WFCS), 2016,
  • [39] Securing peer-to-peer overlay networks from Sybil attack
    Lua, Eng Keong
    2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 1213 - 1218
  • [40] A peer-to-peer communication protocol for underwater acoustic communication
    Smith, SM
    Park, JC
    Neel, A
    OCEANS '97 MTS/IEEE CONFERENCE PROCEEDINGS, VOLS 1 AND 2, 1997, : 268 - 272