Securing communication in a peer-to-peer messaging middleware

被引:0
|
作者
Szilagyi, Peter [1 ,2 ]
机构
[1] Univ Babes Bolyai, Dept Math & Comp Sci, R-3400 Cluj Napoca, Romania
[2] Eotvos Lorand Univ, Sch Informat, Budapest, Hungary
关键词
D O I
10.1109/SYNASC.2013.50
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditionally, message oriented middlewares (MOM) are looked upon as either centralized systems (e.g. AMQP) or a rigidly distributed collection of machines, requiring significant configuration overhead for achieving the desired throughput under the needed security constraints. On the other end of the spectrum, peer-to-peer systems (P2P) in general achieve amazing scalability and fault tolerance, but due to their very nature, are susceptible to various attacks. Since all measures of security have considerable consequences on the system's capabilities, the securing of a peer-to-peer system requires a thorough analysis on the exact designated use-case and environment in which the network is required to operate in, as well as all the possible threats the system must be able to withstand. The paper proposes a security model that bridges the distribution concept of peer-to-peer systems with the necessities of MOMs by rigorously defining the operational environment, assumptions and requirements, on top of which a security protocol was implemented. Taking advantage of the specific use case of P2P MOMs, further optimizations are provided which provide the same security against the defined threat model, but result in significant gains with regard to the overall switching throughput of the network.
引用
收藏
页码:329 / 335
页数:7
相关论文
共 50 条
  • [41] Secure peer-to-peer Group Communication Framework
    Noda, J
    Taguchi, D
    Tani, M
    Nakamura, N
    NEC RESEARCH & DEVELOPMENT, 2003, 44 (04): : 333 - 339
  • [42] Application of peer-to-peer communication for protective relaying
    Yalla, M
    Adamiak, M
    Apostolov, A
    Beatty, J
    Borlase, S
    Bright, J
    Burger, J
    Dickson, S
    Gresco, G
    Hartman, W
    Hohn, J
    Holstein, D
    Kazemi, A
    Michael, G
    Sufana, C
    Tengdin, J
    Thompson, A
    Udren, E
    IEEE TRANSACTIONS ON POWER DELIVERY, 2002, 17 (02) : 446 - 451
  • [43] Netlet: A simple and versatile network middleware for peer-to-peer application program
    Lyu, Zehua
    Tu, Xuping
    Pei, Xiaobing
    Liang, Hu
    Sarem, Mudar
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 1 - 14
  • [44] Symmetric and synchronous communication in peer-to-peer networks
    Witzel, Andreas
    MATHEMATICS OF PROGRAM CONSTRUCTION, PROCEEDINGS, 2008, 5133 : 404 - 421
  • [45] Towards a comprehensive peer-to-peer communication model
    Pajaro, J
    d'Auriol, BJ
    CIC '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN COMPUTING, 2004, : 281 - 287
  • [46] The Missing Piece Syndrome in Peer-to-Peer Communication
    Hajek, Bruce
    Zhu, Ji
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 1748 - 1752
  • [47] WonGoo: A peer-to-peer protocol for anonymous communication
    Lu, TB
    Fang, BX
    Sun, YZ
    Cheng, XQ
    PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 1102 - 1106
  • [48] A PEER-TO-PEER COMMUNICATION INFRASTRUCTURE FOR GROUPWARE APPLICATIONS
    Gotthelf, Pablo
    Zunino, Alejandro
    Campo, Marcelo
    INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2008, 17 (04) : 523 - 554
  • [49] Communication Optimization in Blockchain Peer-to-Peer Networks
    Zhang, Ke
    Peng, Zhenwen
    Zong, Ruixing
    Wang, Qiong
    Xiao, Xiong
    Tang, Zhuo
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 742 - 747
  • [50] Lawful Interception in WebRTC Peer-To-Peer Communication
    Wagner, Assaf
    Puzis, Rami
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, 2021, 12716 : 153 - 170